Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Medium Access Issues David Holmer
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
Wireless Networks Reading: Section 2.8 COS 461: Computer Networks Spring
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Wireless Networks Reading: Section 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
MAC Protocol By Ervin Kulenica & Chien Pham.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Wireless Networks COS 461: Computer Networks Spring 2013 Mike Freedman 1.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
CIS 725 Wireless networks. Low bandwidth High error rates.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Opersating Mode DCF: distributed coordination function
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
1 Impact of transmission errors on TCP performance (Nitin Vaidya)
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Chapter 6 Multiple Radio Access
Wireless Networks Mike Freedman COS 461: Computer Networks 1.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
TCP: Transmission Control Protocol Part II : Protocol Mechanisms Computer Network System Sirak Kaewjamnong Semester 1st, 2004.
1 Wireless Networking Primer (few topics that may help in understanding other lectures) Nitin Vaidya University of Illinois at Urbana-Champaign.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Recitation 8 Wireless Networks.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Universität Karlsruhe Institut für Telematik ECE 591
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
Copyright © Syed Ali Khayam 2007 CC-885: Wireless Networks Syed Ali Khayam NUST Institute of Information Technology (NIIT) National University of Sciences.
WLAN.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Data Link Layer Flow and Error Control. Flow Control Flow Control Flow Control Specifies the amount of data can be transmitted by sender before receiving.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray,Jeffrey B. Carruthers and David Starobinski WCNC 2003.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Media Access Methods MAC Functionality CSMA/CA with ACK
COMP 431 Internet Services & Protocols
Wireless LANs Wireless proliferating rapidly.
Distributed Medium Access Control in Wireless Networks
MACAW: A Media Access Protocol for Wireless LAN’s
MACAW: A Media Access Protocol for Wireless LANs
TCP and MAC interplay in Wireless Ad Hoc Networks
Goal Control the amount of traffic in the network
Wireless LAN Simulation IEEE MAC Protocol
TCP Congestion Control
Computer Networks Protocols
Wireless LAN Protocols
Impact of transmission errors on TCP performance
Presentation transcript:

Recitation 8 Wireless Networks

Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS), incl. length of data – Receiver responds with “Clear to Send” (CTS) If sender sees CTS, transmits data (of specified length) If other node sees CTS, will idle for specified period If other node sees RTS but not CTS, free to send 2

Hidden Terminal Problem A and C cant see each other, both send to B RTS/CTS can help – Both A and C would send RTS that B would see first – B only responds with one CTS (say, echoing A’s RTS) – C detects that CTS doesn’t match and wont send 3 C B A

Exposed Terminal Problem B sending to A, C wants to send to D As C receives packets, carrier sense would prevent it from sending to D, even though wouldn’t interfere RTS/CTS can help – C hears RTS from B, but not CTS from A – C knows its transmission will not interfere at B’s receiver – C is safe to transmit to D 4 C B A D

a.When using RTS/CTS, what prevents a hidden terminal from clobbering the packets that another node is sending?

Hidden terminal would see the CTS of the sender’s desired destination, but not the RTS of the sender, and choose not to send to the same destination as had sent the CTS.

(b) When using RTS/CTS, how does an exposed terminal decides it is safe to send?

Exposed terminal would see the RTS of another node, but not the corresponding CTS (from the other node’s destination), and know it’s safe to send.

2. Why does TCP perform badly on wireless links? What can be done to improve performance without requiring all wired hosts to upgrade to a new protocol?

In contrast to wired networks, packet loss in wireless networks is not necessarily a sign of congestion; rather, interference and/or fading may be the cause. Yet, TCP treats packet loss as an implicit sign of congestion and decreases the sending rate. The performance could be improved by employing a TCP proxy at the wireless/wired boundary.

3. Why are many packet losses in wireless networks detected by a timeout rather than a triple-duplicate acknowledgment? What are the performance implications?

Wireless networks tend to experience periodically sustained packet loss due to interference (e.g. a microwave). This decreases the likelihood that, in the same TCP sending window, some packets are lost while others are successfully delivered. Instead, all of the packets are lost. Some successful deliveries are necessary to trigger the receiver to send duplicate acknowledgments. As such, periodically sustained loss tends to require the sender to rely on retransmission timeout to detect loss. (In addition, many wireless networks have relatively low capacity, leading the sender to have a relatively small congestion window. This also decreases the likelihood that enough packets are successfully delivered to enable detection of an earlier packet loss by duplicate acknowledgments. Similarly, wireless users may do smaller transfers due to limited bandwidth or small screen sizes of smaller graphics needed on smartphones, etc., and small transfers offer less opportunity for multiple packets in flight during the same RTT.)

In this wireless topology, A, B, C, and D all have equi-sized transmission ranges, while E has a smaller range. Assume that two nodes’ transmissions will interfere if and only if they transmit at the same time and their transmission areas overlap. Further, assume that losses only occur due to collisions. When D communicates with C, what nodes are exposed terminals and what nodes are hidden terminals?

In this wireless topology, A, B, C, and D all have equi-sized transmission ranges, while E has a smaller range. Assume that two nodes’ transmissions will interfere if and only if they transmit at the same time and their transmission areas overlap. Further, assume that losses only occur due to collisions. When D communicates with C, what nodes are exposed terminals and what nodes are hidden terminals? only B is a hidden terminal and there are no exposed terminals

If A sends data to B and C sends data to D (as fast as they can), and no collision detection mechanism is used, what is the throughput of their transfer as a proportion of their send rate? A -> B ? C -> D ?

If A sends data to B and C sends data to D (as fast as they can), and no collision detection mechanism is used, what is the throughput of their transfer as a proportion of their send rate? A -> B ? 0% C -> D ? 100%

If A sends data to B and C sends data to D (as fast as they can), and CSMA is used, what is the throughput of their transfer as a proportion of their send rate? A -> B ? C -> D ?

If A sends data to B and C sends data to D (as fast as they can), and CSMA is used, what is the throughput of their transfer as a proportion of their send rate? A -> B ? 0% C -> D ? 100%

Now assume a RTS / CTS protocol is used. Assume that the overhead from RTS and CTS packets is small relative to the data transfer. What are the approximate throughputs of the transfer from each node? A -> B ? C -> D ?

Now assume a RTS / CTS protocol is used. Assume that the overhead from RTS and CTS packets is small relative to the data transfer. What are the approximate throughputs of the transfer from each node? A -> B ? 50% C -> D ? 50%

AB C D E Hidden Terminals for E B? E A D C B

AB C D E Hidden Terminals for E B? D E A D C B

AB C D E Hidden Terminals for E B? D Exposed Terminals for B -> D? E A D C B

AB C D E Hidden Terminals for E B? D Exposed Terminals for B -> D? A, E, & C E A D C B