Doc.: IEEE 802.11-01/171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 1 HCF Access through Tiered Contention Mathilde Benveniste.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /144 Submission March 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 1 An E-DCF Proposal Using TCMA Mathilde Benveniste AT&T Labs,
Advertisements

Doc.: IEEE /375 Submission November 2000 Mathilde Benveniste, AT&T Labs - ResearchSlide 1 Tiered Contention, A QoS-Based Distributed Medium Access.
Doc.: IEEE /413r0 Submission S. Choi, Philips Research July 2001 Slide 1 Can EDCF Support QoS? Sunghyun Choi Philips Research-USA Briarcliff Manor,
Doc.:IEEE /525Ar0 Submission September 2002 Mathilde Benveniste, Avaya Labs Slide 1 Simplifying Polling Mathilde Benveniste
Doc.: IEEE /630r1a Submission S. Choi, Philips Research November 2001 Slide 1 HC Recovery and Backoff Rules Sunghyun Choi and Javier del Prado.
PS-Poll TXOP Using RTS/CTS Protection
Doc.: IEEE /594r0 Submission September 2002 M. Benveniste & D. Chen, Avaya Labs ResearchSlide 1 PF Differentiation and EDCF/RR Mathilde Benveniste.
Doc.: IEEE /630r4a Submission S. Choi, Philips Research January 2002 Slide 1 HC Recovery and Backoff Rules Sunghyun Choi and Javier del Prado.
Contents IEEE MAC layer operation Basic CSMA/CA operation
Doc.: IEEE /328r0 Submission May 2001 Menzo Wentink, Intersil Slide 1 Interpretations of Backoff Menzo Wentink Intersil
1 QoS Schemes for IEEE Wireless LAN – An Evaluation by Anders Lindgren, Andreas Almquist and Olov Schelen Presented by Tony Sung, 10 th Feburary.
Lecture #2 Chapter 14 Wireless LANs.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
Company LOGO Provision of Multimedia Services in based Networks Colin Roby CMSC 681 Fall 2007.
Doc.: IEEE /2910r0 Submission November 2007 Mathilde Benveniste, Avaya LabsSlide 1 Simplified ‘Express’ Forwarding for single-channel wireless.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
IEEE EDCF: a QoS Solution for WLAN Javier del Prado 1, Sunghyun Choi 2 and Sai Shankar 1 1 Philips Research USA - Briarcliff Manor, NY 2 Seoul National.
Submission doc.: IEEE /569r1 November 2001 M. Benveniste -- AT&T Labs, ResearchSlide 1 An Access Mechanism for Periodic Contention-Free Sessions.
LOCAL AREA NETWORKS. CSMA/CA In a wired network, the received signal has almost the same energy as the sent signal because either the length of the cable.
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
doc.: IEEE /243r2 Submission May 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 1 Proposed Changes to the e D1.0 Draft Mathilde Benveniste.
Doc.: IEEE /0619r1 Submission May 2008 M. Benveniste (Avaya Labs) Scheduled service periods in wireless mesh Notice: This document has been prepared.
Submission doc.: IEEE 11-14/0866r0 July 2014 Johan Söder, Ericsson ABSlide 1 Traffic modeling and system capacity performance measure Date:
Doc.: IEEE /243r1 Submission May 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 1 Proposed Changes to the e D1.0 Draft Mathilde Benveniste.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Doc.: IEEE /456 Submission December 2000 Mathilde Benveniste, AT&T Labs - ResearchSlide 1 Backward Compatibility of ‘Tiered Contention’ Multiple.
Doc.: IEEE /0097r0 SubmissionJarkko Kneckt (Nokia)Slide 1 Bandwidth Specific TXOP Limits Date: Authors: January 2011.
Doc.: IEEE /457 Submission December 2000 Mathilde Benveniste, AT&T Labs - ResearchSlide 1 An Enhanced-DCF Proposal Based on ‘Tiered Contention’
MAC for WLAN Doug Young Suh Last update : Aug 1, 2009 WLAN DCF PCF.
Doc.: IEEE /361 Submission October 2000 Wim Diepstraten, LucentSlide 1 Distributed QoS resolution Greg Chesson-Altheros Wim Diepstraten- Lucent.
Doc.: IEEE /0707r0 Submission July 2005 Mathilde Benveniste, Avaya LabsSlide 1 Short presentation on the CCC protocol for mesh MAC Mathilde Benveniste.
Submission doc.: IEEE /599r1 November 2001 M. Benveniste -- AT&T Labs, ResearchSlide 1 ‘Cyclic Prioritized Multiple Access (CPMA): An Access Mechanism.
Doc.: IEEE /0624r2 SubmissionLiwen Chu Etc.Slide 1 Scheduled Medium Access For Large Low Power BSS Date: Authors: Date: May, 2012.
November 2000 Jin-Meng Ho, Texas InstrumentsSlide 1 doc.: IEEE /367 Submission p-DCF for Prioritized MAC Service Jin-Meng Ho, Sid Schrum, and.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
doc.: IEEE /409r0 Submission March 2002 Mathilde BenvenisteSlide 1 Persistence Factors in EDCF Mathilde Benveniste
Submission doc.: IEEE /596r1 November 2001 M. Benveniste -- AT&T Labs, ResearchSlide 1 ‘Neighborhood Capture’ in Wireless LANs Mathilde Benveniste.
Doc.: IEEE /145r1 Submission March 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 1 E-DCF with Backoff Adaptation to Traffic Mathilde Benveniste.
Doc.: IEEE /110 Submission May 2000 Sunghyun Choi, Philips ResearchSlide 1 QoS Support in : Contention-Free MAC Perspective Sunghyun Choi.
AIFS – Revisited Mathilde Benveniste
Mathilde Benveniste Avaya Labs
EA C451 (Internetworking Technologies)
Overview of ‘Tiered Contention’ Multiple Access (TCMA)
Topics in Distributed Wireless Medium Access Control
An Access Mechanism for Periodic Contention-Free Sessions
IEEE : Wireless LANs ALOHA, Slotted ALOHA
HCF medium access rules
Neighborhood Capture and OBSS
AIFS – Revisited Mathilde Benveniste
Overlapping coverage issues with n BSSs
NAV Protection Mathilde Benveniste Avaya Labs, Research July 2003
802.11e features for the enterprise
Splicing in a Mesh Network
NAV Protection Mathilde Benveniste Avaya Labs, Research July 2003
EDCA Backoff Rules Mathilde Benveniste
doc.: IEEE /457 Mathilde Benveniste AT&T Labs, Research
Scheduled Medium Access For Large Low Power BSS
Overlapping IEEE ah Networks of Different Types
E-DCF with Backoff Adaptation to Traffic
HCF Channel Access And Inter-BSS Channel Sharing
HCF medium access rules
Overlapping coverage issues with n BSSs
Neighborhood Capture and OBSS
802.11e features for the enterprise
HCF medium access rules
July 2007 doc.: IEEE /2090r0 Aug 2007 Discussion on CCA Sensing on 20/40 MHz Secondary Channel with PIFS and DIFS Date: Authors: Notice:
HCF medium access rules
NAV Protection Mathilde Benveniste Avaya Labs, Research July 2003
NAV Clearing: Problems and Proposed Remedy
‘Shield’: Protecting High-Priority Channel Access Attempts
Presentation transcript:

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 1 HCF Access through Tiered Contention Mathilde Benveniste AT&T Labs, Research

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 2 In agreement with other proposals EDCF can be used by HC to access the channel HC is the highest priority class - uses shortest AIFS Backoff is needed to deal with Inter-BSS interference

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 3 Concern If there is a collision between HCs and there is random backoff, ESTAs can access the channel before the HC –too long a backoff could leave idle slots; (PIFS + 1)=DIFS allows an ESTA to transmit first –too short a backoff causes collisions between HCs

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 4 Remedy Ideal Tag Scheduling with deterministic backoff will remove idle gaps; ESTAs cannot access the channel before the HC avoid most collisions

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 5 Tag scheduling Tags are labels, such as 1, 2, 3, …, assigned to different BSSs Interfering BSS are assigned different tags Tags correspond to different backoff delays >> Collisions are diminished Each backoff delay increases by 1 slot With compact re-use of tags, there are no idle slots >> (E)DCF stations cannot seize the channel

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 6 Frame 2Frame 1 Time 1 Channel - 3 AP groups AP 2 AP 3 AP 1 AP 2 AP 3 Deterministic backoff procedure

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 7 Tag scheduling cont’ed To give each BSS (or group of BSS with the same tag) a fair chance at the channel, the tags are ordered in a way that is known a priori; this is the order of channel access. Increasing backoff delays are associated with decreasing tag rank in this ordering. For instance, a cyclic permutation for three tags, t=1, 2, 3, would give the following channel access ordering: 1, 2, 3 for the first frame, 3, 1, 2 next, and then 2, 3, 1.

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 8 Frame 2Frame 1 Time 1 Channel - 3 AP groups AP 2 AP 3 AP 1 Frame 3Frame 4Frame 5 Frame 6 Fair access through permutation of tags

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 9 QoS Management Delay-sensitive traffic will be sent first, followed by traffic with lower priority. Two or more backoff values associated with each tag, a shorter value for the higher priority traffic and longer ones for lower priority. As long as all the deferral time interval for low-priority traffic are longer than the deferral time intervals for higher priority traffic of any tag, top-priority packets are generally transmitted before any lower-priority packets.

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 10 Frame 2Frame 1 Time AP 1 AP 2 AP 3 AP 2 AP 3 AP 1 highlow priority Two Priority Classes

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 11 Tag re-use Non-interfering BSS are assigned the same tags Tag assignment may be either –pre-planned; APs are placed on a grid and tag assignment follows a re-use pattern (a) –ad-hoc; APs are located where convenient (b) and tag assignment is treated like Dynamic Channel Selection

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 12 Tag re-use examples t1 t2 t3 t4 t1 t3 t2 t1 t2 t3 t1 t2 t1 t3 t1 t2 t3 t2 t1 t2 t3 t1 t2 t3 t1 t2 t1 t3 t1 t2 t3 t2 t1 t2 t3 1 t2 t3 t1 (a)(b)

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 13 Inter-BSS NAV protection The NAV prevents contention from (E)DCF stations during a contention-free session (The NAV specifies the duration of the session.) A new NAV, Inter-BSS NAV (IBNAV), prevents contention from the HC in an interfering BSS All ESTAs echo the beacon received from an HC (own or neighboring) The IBNAV is set by an HC either –when the beacon is transmitted by the HC, or –when echoed by ESTAs by sending the CFTR

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 14 AB A 1 Overlapping BSS and CFTR A, B are HCs; A 1 is an ESTA associated with A, but hears both HCs When A 1 receives a beacon –it sends a contention-free time response (CFTR), containing the duration of the contention-free period found in the beacon –ESTAs update their IBNAV –HCs update their IBNAV

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 15 IBCP -- Increasing the protection of NAV/IBNAV The NAV and IBNAV use different contention-free session length to further prevent contention from DCF traffic during HC channel access The NAV expires later than the IBNAV by a period IBCP (inter-BSS contention period) IBCP enables the HCs to attempt access without contention from DCF traffic IBCP can be used with both deterministic and random backoff

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 16 Setting IBCP for Deterministic Backoff When using deterministic backoff with Tag Scheduling, IBCP is set <= the maximum number of tags. IBCP protection supplements the protection offered by “not so compact” tag re-use Therefore, assigning tags becomes easier (the simplest way to assign tags is to give a different tag to each BSS -- i.e. without re-use) The best results will involve some tag re-use and a small IBCP value

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 17 Collision possibilities Collisions are possible because of variable session lengths – Retry with a backoff will resolve collisions Collisions are also possible if interfering BSSs get the same tag –Change tags to avoid collisions (adaptive tag selection); –and resolve collisions with random backoff with contention windows (and/or offsets) that increase inversely with the rank of the associated tag; –or start with random backoff, instead of deterministic, using contention windows (and/or offsets) that increase inversely with the rank of the associated tag

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 18 Setting IBCP for Random Backoff If random backoff is used, IBCP is set to the contention window size A reasonable contention window size must be used to avoid collisions between HCs Given reasonable re-use of the tags, the channel time devoted to the IBCP would be less with deterministic backoff delays, as compared to random Random backoff should be used for resolution of collisions arising from interfering tag assignment

doc.: IEEE /171 Submission July 2001 Mathilde Benveniste, AT&T Labs - ResearchSlide 19 Conclusions Inter-BSS interference can be avoided through Tiered Contention by assigning HCs top priority Tag Scheduling and deterministic backoff sequence access of BSS fairly, quickly, and with the fewest collisions The CFTR frame and the IBNAV prevent interfering BSSs from engaging in overlapping contention-free sessions HCs are assured access before (E)DCF stations through tag re-use and the IBCP time Retry and backoff resolve any collisions between HCs, should they occur (low probability)