Presentation is loading. Please wait.

Presentation is loading. Please wait.

Medium access control By Saumya Chaturvedi. PRIMARY MEDIUM ACCESS CONTROL (MAC) ATTRIBUTES Collision avoidance – Basic task of a MAC protocol Energy efficiency.

Similar presentations


Presentation on theme: "Medium access control By Saumya Chaturvedi. PRIMARY MEDIUM ACCESS CONTROL (MAC) ATTRIBUTES Collision avoidance – Basic task of a MAC protocol Energy efficiency."— Presentation transcript:

1 Medium access control By Saumya Chaturvedi

2 PRIMARY MEDIUM ACCESS CONTROL (MAC) ATTRIBUTES Collision avoidance – Basic task of a MAC protocol Energy efficiency – One of the most important attributes for sensor networks, since most nodes are battery powered Scalability and adaptively – Network size, node density and topology change

3 Other MAC Attributes Channel utilization – How well is the channel used? Also called bandwidth utilization or channel capacity Latency – Delay from sender to receiver; single hop or multi-hop Throughput – The amount of data transferred from sender to receiver in unit time Fairness – Can nodes share the channel equally?

4 MEDIUM ACCESS CONTROL (MAC) The role of medium access control (MAC) – Controls when and how each node can transmit in the wireless channel Why do we need MAC? – Wireless channel is a shared medium – Radios transmitting in the same frequency band interfere with each other – collisions – Other shared medium examples: Ethernet

5 MULTIPLE-ACCESS PROTOCOLS

6 ALOHA CHANNEL ALLOCATION

7 In pure ALOHA, frames are transmitted at completely arbitrary times.

8 PROCEDURE FOR ALOHA PROTOCOL

9 Mechanism – random, distributed (no central arbiter), time- multiplex – Slotted Aloha additionally uses time-slots, sending must always start at slot boundaries Aloha Slotted Aloha Aloha/slotted aloha sender A sender B sender C collision sender A sender B sender C collision t t

10 1-persistent CSMA Station listens. If channel idle, it transmits. If collision, wait a random time and try again. If channel busy, wait until idle. If station wants to send AND channel == idle then do send. Success here depends on transmission time - how long after the channel is sensed as idle will it stay idle (there might in fact be someone else's request on the way.)

11 PERSISTENCE STRATEGIES

12 P-Persistent CSMA Slotted channel used When station become ready to send, it sense the channel, if it is idle, transmit with probability p or defer with probability q=1-p and defer until next slot If that slot is idle either transmit or defer with probability p or q

13 Basic Bit map collision free protocol N station with unique address 0 to N-1 Propagation delay is negligible Each contention period consist of exactly N slots, and station send bit 1 during its slot. No other station is allowed to transmit the bit during assigned slot After N slots passed each station has complete knowledge which station wish to transmit Efficiency is d/(d+N)

14 The basic bit-map protocol, Collision-Free Protocols

15 Motivation Can we apply media access methods from fixed networks? FOR WIRED NETWORK: Signal strength in entire medium is almost same On collision every one knows Interested in collision at receiver rather than at sender Example CSMA/CD: send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3) Problems in wireless networks – signal strength decreases proportional to the square of the distance – the sender would apply CS and CD, but the collisions happen at the receiver – it might be the case that have hidden terminal, far and near problem – Un-necessary delay in case of hidden terminal problem ( C want to send another mobile (other than A or B) while B is sending to A, C wait un- necessarily)

16 Hidden terminals – A sends to B, C cannot receive A – C wants to send to B, C senses a “free” medium (CS fails) – collision at B, A cannot receive the collision (CD fails) – A is “hidden” for C Exposed terminals – B sends to A, C wants to send to another terminal (not A or B) – C has to wait, CS signals a medium in use – but A is outside the radio range of C, therefore waiting is not necessary – C is “exposed” to B Motivation - hidden and exposed terminals BAC

17 Terminals A and B send, C receives – signal strength decreases proportional to the square of the distance – the signal of terminal B therefore drowns out A’s signal – C cannot receive A If C for example was an arbiter for sending rights, terminal B would drown out terminal A already on the physical layer Also severe problem for CDMA-networks - precise power control needed! Motivation - near and far terminals ABC

18 Access methods SDMA/FDMA/TDMA SDMA (Space Division Multiple Access) – segment space into sectors, use directed antennas – cell structure FDMA (Frequency Division Multiple Access) – assign a certain frequency to a transmission channel between a sender and a receiver – permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum) TDMA (Time Division Multiple Access) – assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time The multiplexing schemes presented in chapter 2 are now used to control medium access!

19 Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 3.19 FREQUENCY DIVISION DUPLEX (FDD) Simultaneous access of medium from base station to mobile station Up-link frequency: from Mobile station to base station 890.2 to 915MHZ Uplink frequency for any of n channel is fu=890MHZ+n*0.2MHZ Down-link frequency: from Mobile station to base station 935.2 to 960MHZ Down-link frequency for any of n channel is fu=935MHZ+n*0.2MHZ Each up-link and down-link have 124 channel each with size of 200KHZ each.

20 FDD/FDMA - general scheme, example GSM f t 124 1 1 20 MHz 200 kHz 890.2 MHz 935.2 MHz 915 MHz 960 MHz

21 TDM FOR DUPLEX 12 slot for each direction, total 24 slots for both Each slot have time 417Micro second Pattern is repeated after 10 millisecond. Guarantee access of medium Perfectly opted for fixed rate and symmetric connection It is too static and inflexible. Inefficient for busty data or asymmetric connection

22 Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 3.22 TDD/TDMA - GENERAL SCHEME, EXAMPLE DECT 12311121231112 t downlinkuplink 417 µs

23 DAMA - Demand Assigned Multiple Access Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming Poisson distribution for packet arrival and packet length) Reservation can increase efficiency to 80% – a sender reserves a future time-slot – sending within this reserved time-slot is possible without collision – reservation also causes higher delays – typical scheme for satellite links Examples for reservation algorithms: – Explicit Reservation according to Roberts (Reservation-ALOHA) Combination of reservation mechanism and fixed TDM Have reservation period followed by transmission period Collision can occur during reservation period not during transmission period. Follow explicit reservation policy Different mobile station on earth can reserve the slot for mobile satellite. – Reservation-TDMA: Combination of reserved ALOHA and best effort.

24 Access method DAMA: Explicit Reservation Explicit Reservation (Reservation Aloha): – two modes: ALOHA mode for reservation: competition for small reservation slots, collisions possible reserved mode for data transmission within successful reserved slots (no collisions possible) – it is important for all stations to keep the reservation list consistent at any point in time and, therefore, all stations have to synchronize from time to time AlohareservedAlohareservedAlohareservedAloha collision t

25 PACKET RESERVATION MULTIPLE ACCESS (PRMA)  Slots are reserved implicitly  Certain number of slots are repeated in fixed TDM manner  Satellite broadcast status of each slot to all mobile stations  All the station receive the vector and know which slot is occupied and which is free.  All station wishing to transmit can compete for free slot in ALOHA fashion  Already occupied slots are not touched  Combination of fixed and random TDM schemes with reservation policy. Ensure transmission with guaranteed data rate

26 Access method DAMA: PRMA Implicit reservation (PRMA - Packet Reservation MA): – a certain number of slots form a frame, frames are repeated – stations compete for empty slots according to the slotted aloha principle – once a station reserves a slot successfully, this slot is automatically assigned to this station in all following frames as long as the station has data to send – competition for this slots starts again as soon as the slot was empty in the last frame frame 1 frame 2 frame 3 frame 4 frame 5 12345678time-slot collision at reservation attempts ACDABA F AC ABA A BAF A BAF D ACEEBAFD t ACDABA-F AC-ABAF- A---BAFD ACEEBAFD reservation

27 Access method DAMA: Reservation- TDMA Reservation Time Division Multiple Access – every frame consists of N mini-slots and x data-slots – every station has its own mini-slot and can reserve up to k data-slots using this mini-slot (i.e. x = N * k). – other stations can send data in unused data-slots according to a round-robin sending scheme (best-effort traffic) N mini-slots N * k data-slots reservations for data-slots other stations can use free data-slots based on a round-robin scheme e.g. N=6, k=2

28 MACA - COLLISION AVOIDANCE MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidance – RTS (request to send): a sender request the right to send from a receiver with a short RTS packet before it sends a data packet – CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive Signaling packets contain – sender address – receiver address – packet size Variants of this method can be found in IEEE802.11 as DFWMAC (Distributed Foundation Wireless MAC)

29 MACA avoids the problem of hidden terminals – A and C want to send to B – A sends RTS first – C waits after receiving CTS from B MACA avoids the problem of exposed terminals – B wants to send to A, C to another terminal – now C does not have to wait for it cannot receive CTS from A MACA examples A B C RTS CTS A B C RTS CTS RTS

30 MACA variant: DFWMAC in IEEE802.11 idle wait for the right to send wait for ACK senderreceiver packet ready to send; RTS time-out; RTS CTS; data ACK RxBusy idle wait for data RTS; RxBusy RTS; CTS data; ACK time-out  data; NAK ACK: positive acknowledgement NAK: negative acknowledgement RxBusy: receiver busy time-out  NAK; RTS

31 Polling mechanisms If one terminal can be heard by all others, this “central” terminal (a.k.a. base station) can poll all other terminals according to a certain scheme – now all schemes known from fixed networks can be used (typical mainframe - terminal scenario) Example: Randomly Addressed Polling – base station signals readiness to all mobile terminals – terminals ready to send can now transmit a random number without collision with the help of CDMA or FDMA (the random number can be seen as dynamic address) – the base station now chooses one address for polling from the list of all random numbers (collision if two terminals choose the same address) – the base station acknowledges correct packets and continues polling the next terminal – this cycle starts again after polling all terminals of the list

32 Access method CDMA CDMA (Code Division Multiple Access) – all terminals send on the same frequency probably at the same time and can use the whole bandwidth of the transmission channel – each sender has a unique random number, the sender XORs the signal with this random number – the receiver can “tune” into this signal if it knows the pseudo random number, tuning is done via a correlation function Disadvantages: – higher complexity of a receiver (receiver cannot just listen into the medium and start receiving if there is a signal) – all signals should have the same strength at a receiver Advantages: – all terminals can use the same frequency, no planning needed – huge code space (e.g. 2 32 ) compared to frequency space – interferences (e.g. white noise) is not coded – forward error correction and encryption can be easily integrated

33 CDMA in theory Sender A – sends A d = 1, key A k = 010011 (assign: „0“= -1, „1“= +1) – sending signal A s = A d * A k = (-1, +1, -1, -1, +1, +1) Sender B – sends B d = 0, key B k = 110101 (assign: „0“= -1, „1“= +1) – sending signal B s = B d * B k = (-1, -1, +1, -1, +1, -1) Both signals superimpose in space – interference neglected (noise etc.) – A s + B s = (-2, 0, 0, -2, +2, 0) Receiver wants to receive signal from sender A – apply key A k bitwise (inner product) A e = (-2, 0, 0, -2, +2, 0)  A k = 2 + 0 + 0 + 2 + 2 + 0 = 6 result greater than 0, therefore, original bit was „1“ – receiving B B e = (-2, 0, 0, -2, +2, 0)  B k = -2 + 0 + 0 - 2 - 2 + 0 = -6, i.e. „0“

34 CDMA on signal level I data A key A signal A data  key key sequence A Real systems use much longer keys resulting in a larger distance between single code words in code space. 101 100100100010110011 011011100010001100 AdAd AkAk AsAs

35 CDMA on signal level II signal A data B key B key sequence B signal B A s + B s data  key 100 000110101000010111 111001101000010111 BdBd BkBk BsBs AsAs

36 CDMA on signal level III AkAk (A s + B s ) * A k integrator output comparator output A s + B s data A 1 01 101 AdAd

37 CDMA on signal level IV integrator output comparator output BkBk (A s + B s ) * B k A s + B s data B 1 00 100 BdBd

38 comparator output CDMA on signal level V wrong key K integrator output (A s + B s ) * K A s + B s (0) ?

39 Aloha has only a very low efficiency, CDMA needs complex receivers to be able to receive different senders with individual codes at the same time Idea: use spread spectrum with only one single code (chipping sequence) for spreading for all senders accessing according to aloha. Combination of CDMA and TDMA SAMA - Spread Aloha Multiple Access 1 sender A 0 sender B 0 1 t narrow band send for a shorter period with higher power spread the signal e.g. using the chipping sequence 110101 („CDMA without CD“) Problem: find a chipping sequence with good characteristics 1 1 collision

40 Comparison SDMA/TDMA/FDMA/CDMA

41 QUESTIONS 1.Consider the case where a mobile station receives different signals from different base stations and these signals is of different length. Discuss the methods used for selection of base station for your mobile. 2.Consider a mobile system where mobility of mobile station is more. Whether MACA (Multiple Access with Collision Avoidance) will be able to deal the hidden terminal problem occur in this situation? Explain with reason. 3. A Mobile services required to deals supported with arbitrary number of devices ( Mobiles). Discuss how Spread ALOHA Multiple Access SAMA a combination of CDMA and TDMA can be able to provide robust services with better collision rate?

42 TUTORIAL SHEET NO 2 Submission date:05-02-2006 Submission Mode-Electronics copy only (in a group of 10 students )


Download ppt "Medium access control By Saumya Chaturvedi. PRIMARY MEDIUM ACCESS CONTROL (MAC) ATTRIBUTES Collision avoidance – Basic task of a MAC protocol Energy efficiency."

Similar presentations


Ads by Google