Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
1 The Case for Heterogeneous Wireless MACs Chun-cheng Chen Haiyun Luo Dept. of Computer Science, UIUC.
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
1 The Medium Access Control Sublayer Chapter 4. 2 The Medium Access Control Sublayer This chapter deals with broadcast networks and their protocols. In.
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
Wireless Medium Access Control Protocols
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
Wireless Networking So we talked about wired networks. What about wireless?
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Presented by Scott McLaren Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Introduction to Wireless Networks Michalis Faloutsos.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Broadcast network access control Some slides used.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
Wireless LAN Simulation - IEEE MAC Protocol
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Recitation 8 Wireless Networks.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
Copyright © Syed Ali Khayam 2007 CC-885: Wireless Networks Syed Ali Khayam NUST Institute of Information Technology (NIIT) National University of Sciences.
WLAN.
Wireless EE 122: Intro to Communication Networks Fall 2010 (MW 4-5:30 in 101 Barker) Scott Shenker TAs: Sameer Agarwal, Sara Alspaugh, Igor Ganichev, Prayag.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Wireless Media Access Protocols Hari Balakrishnan LCS and EECS Massachusetts Institute of Technology
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
Media Access Methods MAC Functionality CSMA/CA with ACK
Communication Networks: Technology & Protocols
Wireless LANs Wireless proliferating rapidly.
MACAW: A Media Access Protocol for Wireless LAN’s
MACAW: A Media Access Protocol for Wireless LANs
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Wireless LAN Simulation IEEE MAC Protocol
Wireless LAN Protocols
Presentation transcript:

Wireless

2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective – need to sense at receiver Hidden Terminals ABC transmit range Collision

3 Exposed Terminals B talks to A C wants to talk to D C senses the channel and finds it busy C remains quiet (when it could have transmitted) Carrier sense would prevent a successful transmission – But we do carrier sense anyway (why?) ABCD

Key Points No concept of a global collision – Different receivers hear different signals – Different senders reach different receivers Collisions are at receiver, not sender – Only care if receiver can hear the sender clearly – It does not matter if sender can hear someone else – As long as that signal does not interfere with receiver Goal of protocol: – Detect if receiver can hear sender – Tell senders who might interfere with receiver to shut up 4

5 MA with Collision Avoidance (MACA) Before every data transmission – Sender sends a Request to Send (RTS) frame containing the length of the transmission – Receiver responds with a Clear to Send (CTS) frame – Sender transmits – Receiver sends an ACK; now another sender can send data When sender doesn’t get a CTS back, it assumes collision When you hear a CTS, you keep quiet until scheduled transmission is over (hear ACK) senderreceiver other node in sender’s range RTS ACK data CTS

6 MACA, con’t If other nodes hear RTS, but not CTS: send – Presumably, destination for first sender is out of node’s range – Can cause problems when a CTS is lost sender receiver other node in sender’s range RTS data CTS data

7 A sends RTS B sends CTS C also hears CTS – C doesn’t transmit Collision avoided! Hidden Terminals ABC transmit range RTS CTS Data CTS

8 Exposed Terminals B sends RTS to A C gets this RTS as well C cannot hear A’s CTS C can also transmit!! ABCD RTS CTS RTS ABCD Transmission can be done Can’t hear CTS A A B B C C D D

Problem 2 Cheating A B C D A A B B C C D D Can C improve it’s performance by “cheating” and ignoring the CTS messages exchanged between A and B?

Problem 2 Cheating A B C D Can D improve it’s performance by “cheating” and ignoring the CTS messages exchanged between A and B? A A B B C C D D

Problem 3: (a) Gagged Station: RTS (1) CTS (2) CTS (2) for A RTS (3) ABCD A A B B C C Transmission Not done D D

ABCD RTS (3) CTS (4) CTS (4) for A ABCD A A B B C C D D E E E RTS (1) RTS (1) for E C can’t hear this C is now masked CTS (2) C doesn’t get to know that A and B are communicating Problem 3: (b) Masked Station:

Problem 3: (c) Fairness? Starvation? RTS (1) CTS (2) CTS (2) for A RTS (3) ABCD A A B B C C Transmission Not done D D

14 Problem 4: Frame Sizing Too small frames Comparable to size of RTS / CTS messages Large overhead!