MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Medium Access Issues David Holmer
Networks: Wireless LANs1 Wireless Local Area Networks.
Contents IEEE MAC layer operation Basic CSMA/CA operation
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
KAIST Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks Suho Yang (CS710: November 4, 2008) Kyle Jamieson, Hari Balakrishnan, Y.C. Tay LNCS.
Wireless Medium Access Control Protocols
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Networks: Wireless LANs1 Wireless Local Area Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Wireless Local Area Networks
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Networks: Wireless LANs1 Wireless Local Area Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
1 Introduction to Wireless Networks Michalis Faloutsos.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Chapter 5 outline 5.1 Introduction and services
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Lecture 4 Wireless Medium Access Control
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
CSE 6590 Wireless LANs and IEEE MAC 15 October 2015.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
IEEE WLAN.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
WLAN.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Wireless Sensor Networks 4. Medium Access
Wireless MAC.
EA C451 (Internetworking Technologies)
Medium Access Control MAC protocols: design goals, challenges,
Lab 7 – CSMA/CD (Data Link Layer Layer)
“Performance Comparison of the Radio Link Protocols of IEEE 802
Computer Communication Networks
Mobile and Ad hoc Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Introduction to Wireless Networks
Wireless LAN Simulation IEEE MAC Protocol
ECSE-4730: Computer Communication Networks (CCN)
Chapter 6 Multiple Radio Access.
Presentation transcript:

MAC Layer Protocols for Wireless Networks

What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access to the physical transmission medium on a LAN. It tries to ensure that no two nodes are interfering with each other ’ s transmissions, and deals with the situation when they do.

CSMA/CD MAC CSMA/CD architecture used in Ethernet is a common MAC layer standard. It acts as an interface between the Logical Link Control sublayer and the network's Physical layer.

Normal Ethernet Operation A B D Data C Address mismatch packet discarded Address mismatch packet discarded Address match packet processed Send data to node D Transmitted packet seen by all stations on the LAN (broadcast medium)

Ethernet Collisions A B C D Collision Data transmission for A Data transmission for C

Ethernet Transmission Flowchart transmit packet assemble packet deferring on? start transmission send jam signal increment attempts compute and wait backoff time done excessive collision errors done transmit ok transmission done ? yes noyes no yes collision detect? too many attempts ?

Interference / Collisions Interference on node b (“Hidden terminal problem”) a b c a b a b cd Interference on node b a and b interfere and hear noise only Packets which suffered collisions should be re-sent. Ideally, we would want all packets to be sent collision- free, only once…

Contention-based protocols CSMA — Carrier Sense Multiple Access Ethernet (CSMA/CD) is not enough for wireless (collision at receiver cannot detect at sender) MACA Protocol AB C Hidden terminal: A is hidden from C’s CS

Hidden Terminal Problem A and C want to send data to B 1. A senses medium idle and sends data 2. C senses medium idle and sends data 3. Collision occurs at B A B C Data

Collision Avoidance w/ RTS/CTS A and C want to send to B 1. A sends RTS (Request To Send) to B 2. B sends CTS (Clear To Send) to A C “ overhears ” CTS from B 3. C waits for duration of A ’ s transmission A B C 1.RTS 2.CTS 3.Data

Overview of MAC Protocols Contention-based protocols (contd.) MACAW — improved over MACA RTS/CTS/DATA/ACK Fast error recovery at link layer IEEE Distributed Coordination Function (DCF) Largely based on MACAW Called CSMA/CA

DCF (Distributed Coordinate Function) Station listens before transmission If medium is free for more than DIFS: transmits Otherwise, uses exponential backoff mechanism

Interframe space (IFS) SIFS : used by ACK, CTS, poll response (short) PIFS : used by PC (point coordinator) when issuing polls (point) DIFS : used by ordinary asynchronous traffic (distributed)

IEEE DCF Distributed coordinate function: ad hoc mode Virtual and physical carrier sense (CS) Network allocation vector (NAV), duration field Binary exponential backoff RTS/CTS/DATA/ACK for unicast packets Broadcast packets are directly sent after CS

Virtual Carrier Sense Timing relationship

Random Backoff Pick a timeslot chosen uniformly in [0, CW] Listen up to chosen slot Transmit if nobody else started transmitting Wait if somebody else started transmitting Time

Example: A Successful Transmission A and B happened to choose different slots Node A chooses slot 4, hears nothing, transmits Node B chooses slot 8, hears Node A, waits Success: exactly one node in first non-vacant slot Node A: Node B: Slot choice (slot #4) Slot choice (slot #8) Time

Example: A Collision A and B happened to choose slot 4 Both listen and hear nothing Both transmit simultaneously Collision: ≥ 2 nodes in first non-vacant slot Node A: Node B: Slot choice (slot #4) Time

High Contention Causes Collisions in CSMA Uniform distribution “fills up,” quickly Unacceptable collision rate above ~15 transmitting sensors

Binary Exponential Backoff (BEB) Creating more slots for solving the collision problem

Problems with BEB Takes time for every node to increase CW Especially if traffic is spatially-correlated and bursty Waste backoff slots if collisions cause CW to increase BEB causes performance to suffer

Q&A