CSE 6590 Wireless LANs and IEEE 802.11 MAC 15 October 2015.

Slides:



Advertisements
Similar presentations
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Advertisements

Networks: Wireless LANs1 Wireless Local Area Networks.
Introduction to IEEE Wireless LAN Standard Huafeng Lü Sep 10, 2002.
Wireless LAN (not assessed) Dr Sandra I. Woolley.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 6/11/ :41 Chapter 10Wireless LANs1 Rivier College CS575: Advanced LANs Chapter 10: Wireless LANs.
Network Technology CSE Network Technology CSE3020 Week 9.
Wireless Local Area Network (LAN)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Networks: Wireless LANs1 Wireless Local Area Networks.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Data and Computer Communications
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Chapter 11: Wireless LANs Business Data Communications, 6e.
Lecture #2 Chapter 14 Wireless LANs.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
CWNA Guide to Wireless LANs, Second Edition
Instructor: Dr. Mustafa Shakir
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Data and Computer Communications Eighth Edition by William Stallings Chapter 17 – Wireless LANs.
IEEE WLAN.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
Universität Karlsruhe Institut für Telematik ECE 591
IEEE Wireless LAN Standard
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
WLAN.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
MAC for WLAN Doug Young Suh Last update : Aug 1, 2009 WLAN DCF PCF.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Wireless MAC.
Wireless MAC.
EA C451 (Internetworking Technologies)
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Wireless Local Area Networks (LANs)
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Wireless LANs CSE 3213 Fall November 2018.
Chapter 6 Medium Access Control Protocols and Local Area Networks
Wireless LANs CSE 3213 Fall January 2019.
Wireless LANs and IEEE MAC
Presentation transcript:

CSE 6590 Wireless LANs and IEEE MAC 15 October 2015

Overview 2

Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access ad hoc networking 3

Infrastructure Wireless LAN 4

Ad Hoc Networking temporary peer-to-peer network (no infrastructure) 5

Wireless LAN Requirements THROUGHPUT – should make efficient use of medium NUMBER OF NODES- hundreds of nodes across multiple cells CONNECTION TO BACKBONE LAN – use of control modules SERVICE AREA – coverage area of 100 to 300m BATTERY POWER CONSUMPTION – reduce power consumption while not in use TRANSMISSION ROBUST AND SECURITY– reliability and privacy/security COLLOCATED NETWORK OPERATION – possible interference between LANs LICENSE-FREE OPERATION – not having to secure a license for the frequency band used by the LAN HANDOFF/ROAMING– enable stations to move from one cell to another DYNAMIC CONFIGURATION- addition, deletion, relocation of end systems without disruption 6

Wireless LAN Technologies spread spectrum LANs mostly operate in ISM (industrial, scientific, and medical) bands no Federal Communications Commission (FCC) licensing is required in USA OFDM LANs orthogonal frequency division multiplexing superior to spread spectrum operate in 2.4 GHz or 5 GHz band infrared (IR) LANs individual cell of IR LAN limited to single room IR light does not penetrate opaque walls 7

IEEE Standards

IEEE Terminology 9

IEEE Architecture 10

IEEE BSS basic service set (BSS) building block may be isolated may connect to backbone distribution system (DS) through access point (AP) BSS generally corresponds to cell DS can be switch, wired network, or wireless network Ad-hoc network: independent BSS (IBSS) with no AP 11

Extended Service Set (ESS) possible configurations: simplest is each station belongs to single BSS can have two BSSs overlap a station can participate in more than one BSS association between station and BSS dynamic ESS is two or more BSS interconnected by DS appears as single logical LAN to LLC 12

Medium Access Control 13

Medium Access Control MAC layer covers three functional areas: reliable data delivery access control security 14

Medium Access Control 15

DCF and PCF PCF and DCF operate concurrently within the same BSS. The two access methods alternate, with a contention-free period (CFP) followed by a contention period (CP). DCF: fundamental access method of IEEE MAC, implemented in all STAs. known as CSMA/CA 16

PCF Supports time-bounded services. Lets stations to have priority access to the wireless medium. Polling stations one by one (centralized operation) Coordinated by Point Coordinator (PC), typically collocated with the AP. PCF has higher priority than the DCF. Beacon frame is a management frame that maintains the synchronization of the timers in the stations and delivers protocol related parameters. 17

Distributed Coordination Function (DCF) 18

19 DCF MAC Requirements To avoid interference among simultaneous transmissions But enable as many non-interfering transmission as possible Maintain fairness among transmissions No centralized coordinators: fully distributed operations No clock synchronization: asynchronous operations

CSMA/CA DCF sub-layer uses CSMA/CA if station has frame to send it listens to medium if medium idle, station may transmit else waits until current transmission completes No collision detection since on wireless network, so use collision avoidance (backoff and RTS/CTS) DCF includes delays that act as a priority scheme DIFS: DCF inter-frame space SIFS: short inter-frame space (SIFS < DIFS) 20

21 Backoff Interval When channel is busy, choose a backoff interval in the range [0, cw] (concept similar to non-persistent). Count down the backoff interval when medium becomes idle. Count down is suspended if medium becomes busy again. When backoff interval reaches 0, transmit data/RTS. Binary exponential backoff in DCF: When a node fails to receive CTS, cw is doubled up (up to an upper bound). When a data transfer completes successfully, cw is reset to cw min.

IEEE Medium Access Control Logic 22

Fig (Leon-Garcia) Basic CSMA/CA operations 23

Fig (Leon-Garcia) Transmission without RTS/CTS 24

25 Carrier Sensing Transmission range Sensing range Sensing range  Transmission range Problems Hidden terminal problem Exposed terminal problem Note: contention matters only at the receiver’s terminal

26 Hidden Terminal Problem A B X No carrier  OK to transmit

27 Exposed Terminal Problem A B XY Presence of carrier  holds off transmission

28 Solutions MACA [Karn 1990] Proposes to solve the hidden terminal problem by RTS/CTS dialog MACAW [Bharghanvan 1994] Increasing reliability by RTS/CTS/DATA/ACK dialog IEEE Distributed Coordination Function (DCF) Also use RTS/CTS/DATA/ACK dialog

29 RTS/CTS dialog (1) RTS Defer Any node hearing this RTS will defer medium access

30 RTS/CTS dialog (2) RTS Defer CTS Defer Any node hearing this CTS will defer medium access

31 RTS/CTS/DATA/ACK dialog Data Defer ACK Defer

Fig (Leon-Garcia) Transmission with RTS/CTS 32

33 IEEE DCF (1) CSMA/CA Contention-based random access Collision detection not possible while transmitting Uses RTS/CTS exchange to avoid hidden terminal problem Any node overhearing a CTS cannot transmit for the duration of the transfer. Any node overhearing an RTS cannot transmit for the duration of the transfer (to avoid collision with ACK) Uses ACK to achieve reliability

34 IEEE DCF (2) Carrier sense in Physical carrier sense Virtual carrier sense using Network Allocation Vector (NAV) RTS/CTS specify duration of subsequent DATA/ACK NAV is updated based on overheard RTS/CTS /DATA Collision avoidance Nodes stay silent when carrier sensed busy (physical/virtual) Backoff intervals are used to reduce collision probability

35 Backoff Interval When channel is busy, choose a backoff interval in the range [0, cw] (concept similar to non-persistent). Count down the backoff interval when medium becomes idle. Count down is suspended if medium becomes busy again. When backoff interval reaches 0, transmit RTS. Binary exponential backoff in DCF: When a node fails to receive CTS, cw is doubled up (up to an upper bound). When a data transfer completes successfully, cw is reset to cw min.

36 IEEE CSMA/CA – Example DIFS: DCF inter-frame spaceSISF: short inter-frame space

37 Disadvantages of IEEE DCF High power consumption Hidden terminal problem not totally solved (e.g., collision of RTS) Exposed terminal problem not solved Fairness problem among different transmitting nodes Only providing best-effort service

Priority IFS Values SIFS (short IFS) for all immediate response actions (see later) PIFS (PCF IFS) used by the centralized controller in PCF scheme when issuing polls DIFS (DCF IFS) used as minimum delay for asynchronous frames contending for access 38

IEEE MAC Timing Basic Access Method 39

SIFS Use SIFS gives highest priority over stations waiting PIFS or DIFS time SIFS used in following circumstances: Acknowledgment (ACK) station responds with ACK after waiting SIFS gap for efficient collision recovery (there is no collision detection) and multi-frame transmission Clear to Send (CTS) station ensures data frame gets through by issuing RTS and waits for CTS response from destination Poll response see Point Coordination Function (PCF) discussion later 40

PIFS and DIFS Use PIFS used by centralized controller for issuing polls has precedence over normal contention traffic but not SIFS DIFS used for all ordinary asynchronous traffic 41

IEEE MAC Frame Format 42

Point Coordination Function (PCF) 43

PCF Superframe Timing 44

Point Coordination Function (PCF) alternative access method implemented on top of DCF polling by centralized polling master (point coordinator) uses PIFS when issuing polls point coordinator polls in round-robin to stations configured for polling when poll issued, polled station may respond using SIFS if point coordinator receives response, it issues another poll using PIFS if no response during expected turnaround time, coordinator issues poll coordinator could lock out asynchronous traffic by issuing polls have a superframe interval defined 45

PCF Examples 46

47

Control Frames 6 control frame types: Power Save-Poll (PS-Poll): sent by any station to the AP; request that the AP transmit a frame that has been buffered for this station while the station was in power-saving mode. RTS CTS ACK Contention-free end (CF-End): sent by the PC to announce the end of a contention-free period. CF-End + CF-ACK: sent by the PC; combined a CF-End with ACK of the data frame the PC last received. 48

Data Frames – Data Carrying 8 data frame types organized in two groups first four carry upper-level data remaining do not carry any user data Data simplest data frame, contention or contention-free use Data + CF-Ack carries data and acknowledges previously received data during contention-free period Data + CF-Poll used by point coordinator to deliver data and poll (request send) Data + CF-Ack + CF-Poll combines Data + CF-Ack and Data + CF-Poll 49

Data Frames – Not Data Carrying Null function carries no data, polls, or acknowledgments carries power management bit in frame control field sent to AP indicates station is changing to low-power state Other three frames CF-Ack, CF-Poll, CF-Ack + CF-Poll same as corresponding frame in the preceding list but without data. 50

PCF Examples 51

52

Management Frames used to manage communications between stations and APs management of associations requests, response, reassociation, dissociation, and authentication 53

IEEE Physical Layer 54

Physical Layer 55

Data Rate vs. Distance (m) 56

802.11n IEEE n has enhancements in 3 general areas: multiple-input-multiple-output (MIMO) antenna architecture most important enhancement radio transmission scheme increased capacity MAC enhancements most significant change is to aggregate multiple MAC frames into a single block for transmission 57

Summary IEEE architecture Medium Access Control Physical Layers , a, b, g, n

Reference 59 Chapter 17, Stallings