Wireless LAN (IEEE class of protocol suite)
|
|
- Emory Chandler
- 7 years ago
- Views:
Transcription
1 Wireless LAN (IEEE class of protocol suite) In these notes, I will explain the MAC protocols used in constructing wireless LANs using the IEEE class of protocol suites. Specific protocols, such as the , will be discussed because these have been standardized and these are used world-wide. At this point, it is important to note the following assumption made in the design of the CSMA/CD protocol to construct a wired LAN: signal from any computer in a network can reach all computers in the network. In a wired LAN, this assumption must hold for computers to be able to reach each other and for the collision detection mechanism to work. However, in a wireless LAN, the above assumption may not hold. That is, signal from a computer may not reach all the computers in the network. Hence, at the MAC level, we do not go for collision detection. Another consequence of signal not reaching all the computers in a network is that computers in a network may not be able to communicate directly. For two computers to be able to communicate, service of another computer in the network or a fixed infrastructure, namely, an Access Point (AP), is used. C: Computer, AP: Access Point C Radio range of the AP Access Point IEEE protocol C Router To the rest of the network AP Figure WL1: Elements of a wireless LAN (WLAN) A wireless LAN using an Access Point (AP) is shown in Figure W1. An AP is the main part of the infrastructure to support a wireless LAN. An AP is connected to a router, which in turn is connected to the rest of the network and the Internet. One of more APs 1
2 may be connected to the same router as shown in the figure, or different APs may be connected to different routers. The APs as well as user computers are equipped with an identical radio interface commonly known as the IEEE standard interface. The IEEE standard specifies both the PHY (physical) and the MAC layers for constructing a wireless LAN. The PHY layer defines the air interface between two IEEE equipped devices and the MAC layer defines the medium access control protocols to access the shared medium. (There are a variety of the IEEE protocol, such as a, b, g, and e. Protocols such as the , a, b, and g differ only in their PHY part, thereby supporting different levels of bandwidth, whereas all their MAC protocols follow the same principle. On the other hand, the e MAC, which has been designed to support multimedia applications, is different from the above protocols. In these notes, we will not discuss the e protocol for lack of time. However, once one understands the MAC protocol, it is easier to understand the more complex e protocol.) Different modes of operation of IEEE MAC protocol Before discussing the details of the IEEE MAC protocol, it is useful to understand the different modes of operation of the protocol as classified below. Modes of IEEE MAC Distributed Coordination Function (DCF) mode Point Coordination Function (PCF) mode With Hand-shake Without Hand-shake Figure W1: Different modes of operation of MAC protocol in a WLAN PCF mode of operation In this mode of operation, an AP acts as the central controller for all the computers lying within the radio range of the AP. The AP decides who transmits when. Thus, there is no 2
3 contention among computers for medium access. The AP can, but not necessarily, follow a round-robin policy to assign time slots to individual computers, thereby guaranteeing a certain amount of bandwidth to each computer. Because of this guarantee of allocation of bandwidth, this mode of operation can support real-time traffic. However, if the amount of traffics generated by different computers widely vary, this mode is not suitable. This is due to the fact that the AP may allocate bandwidth to a computer which may not have much data to transmit. Finally, the IEEE standard says that implementation of the PCF mode of operation is optional. DCF mode of operation In this mode of operation, the presence of an AP is not essential. For example, computers can communicate among themselves using the DCF mode of operation without the assistance of an AP. In such a case, we say that the computers have formed an ad hoc network, where there is an absence of infrastructure, such as APs. However, to construct a wireless LAN with the capability to connect to the Internet, it is essential to have an AP which is connected to a router as shown in Figure W1. Whether or not there is an AP, in the DCF mode of operation all the computers compete for medium access, because there is no central controller if there is an AP, it does not act as a central controller. Because of contention among computers for medium access, there is no guarantee of bandwidth and there is no bound on message delay. Thus, the DCF mode of operation is not suitable for real-time traffic. Rather, data delivery is made on a best effort basis the network makes an effort to deliver data across the wireless medium, but there is no guarantee of bandwidth or bound on delay. Finally, the IEEE standard says that implementation of the DCF mode of operation is mandatory, that is, the DCF mode of operation must be supported by a network card claiming to implement IEEE Note: We have said that the PCF mode is optional, whereas the DCF mode is mandatory. If an AP implements both the modes, the following is a scenario in which both the modes can be used alternatively. For example, the network can run in the PCF mode for T1 seconds, followed by the DCF mode for T2 seconds, followed by the PCF mode for T1 seconds, and so on. In this manner, all, or, some, computers get a guaranteed bandwidth during the PCF mode, whereas all the computers compete for bandwidth in the DCF mode. Those computers without data to be transmitted will not compete for medium access during the DCF mode, thereby allowing those computers with data to enter the contention phase. PCF DCF PCF DCF PCF.. Time Figure W2: Alternative use of PCF and DCF modes 3
4 DCF with hand-shake In this mode, a sender obtains permission from an intended receiver before transmitting a packet to the receiver. This is achieved by the sender transmitting a Request To Send (RTS) packet to the intended receiver, and the receiver granting permission by transmitting a Clear To Send (CTS) packet back to the sender. The intended receiver may refuse to grant permission by remaining silent, i.e. not transmitting a CTS packet back to the sender. The sequence of RTS and CTS control packets is known as the process of hand-shake. An intended receiver can refuse to receive a packet from the sender for a variety of reasons, such as lack of buffer and lack of interest in communicating with the sender, to name a few. This mode of operation is preferred where the network traffic is high or if the packet to be transmitted is a long one. In either case, if hand-shake is not used, the packet will collide with another packet at the receiver with high probability. Thus, it is recommended to use the hand-shake mode of DCF when traffic is very high in the network or a packet is very long. The flip side of using hand-shake is the extra overhead of exchanging RTS/CTS control frames. Essentially, before transmitting a long packet, a sender not only informs the intended receiver about the upcoming transmission, but also both the sender and the intended receiver inform their neighbors via the RTS and CTS control frames about the upcoming transmission so that the neighbors do not initiate their own transmissions while the packet is being transmitted and acknowledged. (The idea of data packet acknowledgement at the MAC level will be explained in a later part of this section.) DCF without hand-shake In this mode of operation, a sender does not take permission from an intended receiver before transmitting a data packet. That is, RTS/CTS control frames are not exchanged between a sender and a receiver before the sender transmits a data packet. Rather, the sender just transmits the packet when certain medium sensing conditions are satisfied. These conditions will be explained in a later part of these notes. Thus, there is no coordination between a sender and a receiver prior to a data packet being transmitted. This lack of coordination increases the probability of packet collision. If data traffic is low or packets are short, then this mode of data transmission avoids the overhead due to hand-shaking. Note: The two modes of DCF operation, namely with hand-shake and without handshake, are not mutually exclusive. Rather, both coexist, and the two modes can be selected on a packet basis. For example, the dotrtsthreshold variable in the MAC management database can be used to choose a certain mode of operation. The dotrtsthreshold variable is initialized with an integer value representing a threshold packet length in bytes. If the length of a data packet is equal to or greater than the dotrtsthreshold value, then the MAC layer chooses the with hand-shake mode. On the other hand, if the packet length is smaller than the dotrtsthreshold 4
5 value, then the without hand-shake mode is chosen to transmit the data packet. This situation has been further explained in Figure W3. Figure W3 shows that a wireless LAN can alternatively operate in the PCF and DCF modes, and within the same DCF mode duration, a computer can successively transmit two data packets in the without handshake and the with hand-shake modes. PCF DCF PCF DCF PCF.. Time With hand-shake Without handshake }mode of operation of the same computer Figure W3: Alternative use of PCF and DCF modes and consecutive appearances of with hand-shake and without hand-shake modes in the same DCF period. Problems in a wireless LAN There are three problems in a wireless LAN, which are not found in wired LANs. These problems are as follows: - Hidden terminal problem - Exposed terminal problem - Inability to detect collision. Hidden terminal problem Assume that all the computers have identical radio ranges. This assumption is not necessary for the problem to occur. Rather, the problem becomes more frequent in the absence of this assumption. Thus, for simplicity of our explanation, we make this assumption. Let there be three computers A, B, and C as shown in Figure W4. Their relative locations and radio ranges have also been shown in Figure W4. The figure shows that A and B are within each other s radio ranges, and B and C too are within each other s radio ranges. Thus, the direct communications that can happen are between A and B and between B and C. However, A and C are outside each other s radio ranges. Now, assume that C is transmitting to B as shown in the figure. Since C is far away from A, A is unaware of the fact that there is an on-going transmission between B and C. Because of this unawareness, A can potentially start its transmission to B or another computer (not shown in the figure), thereby disturbing C s transmission to B. This disturbance happens because C is hidden from A. Thus, a hidden terminal problem occurs when a computer (A) starts its transmission while being unaware of a far-away located computer s (C s) 5
6 transmission to A s neighbor (B). In other words, the problem can occur if two computers (A and C) have a common neighbor (B), but the two computers can not hear each other s signals. Because users, and, hence their computers, are mobile in a wireless LAN, the hidden terminal problem occurs in a wireless LAN. Suitable measures are taken in the IEEE MAC protocol to address this problem. Tx A B C Figure W4: Illustration of the hidden terminal problem Exposed terminal problem Referring to Figure W5, assume that the pairs of computers (D, A), (A, B), and (B, C) are Neighbors in the sense that D and A are within each other s radio ranges. Let A be transmitting a data packet to D. Because of the broadcast nature of this transmission, the same signal also reaches computer B. However, B is not an intended receiver of A s signal. We also know that C is not receiving A s signal. Thus, it is possible for B to start transmitting a data packet to C without disturbing the ongoing transmission from A to D. However, B does not initiate its transmission, because it is unaware of D s location. B does not know if its transmission to C will cause a collision at D. Hence, B does not initiate its transmission while being exposed to A s signal. This is called the exposed terminal problem. In other words, a computer does not start transmitting if it senses that there is an ongoing transmission. Researchers are investigating this issue so that network performance is improved by allowing an exposed terminal to transmit subject to the condition that it does not disturb an ongoing transmission. D Tx A B C 6
7 Figure W5: Illustration of the exposed terminal problem Inability to detect collision Ideally, a sender should detect collision at a receiver, because it is the collision at the receiver that matters. In a wired LAN, collision is detected at the sender s end by assuming that signals from all computers can reach all other computers. However, this assumption does not hold in a wireless LAN as it has been explained in the context of the hidden terminal problem. Another reason for the difficulty in not being able to detect collision is that many wireless devices use half duplex transceivers to simplify transceiver design. That is, a half-duplex wireless device turns on its transmitter and receiver in an alternating manner. As an example, GSM phones use half-duplex transceivers, and this is facilitated by skewing the up-link (transmitting) channel and the down-link (receiving) channel by three time slots so that the transceiver can switch its mode from a transmitter to a receiver and vice versa. Thus, in a wireless LAN, because of the difficulty in detecting collision, MAC protocols do not rely upon collision detection. Rather, the principle of collision avoidance is utilized. Transmit condition and virtual carrier sensing Before a computer can transmit anything data or control packets it is essential to detect idleness of the medium. In a wired LAN, it was sufficient to detect idleness by sensing the physical medium. However, in a wireless LAN, because of the hidden terminal problem, it is not enough to sense the medium to know whether or not the medium is idle. In addition to carrier sensing at the PHY level, the WLAN MAC protocol uses the concept of virtual carrier sensing to tackle the hidden terminal problem. In virtual carrier sensing, a computer monitors the transmission of all control packets that it can receive, utilizes the duration information contained in those packets, and infers whether or not the medium is idle at its intended receiver. Thus, the medium is said to be idle if the PHY level carrier sensing mechanism detects no carrier and it is inferred from the virtual carrier sensing mechanism that the intended receiver within its radio range is not receiving data. 7
8 Transmit condition Medium is idle Absence of carrier detected by the carrier sensing mechanism at the PHY level. and The virtual carrier sensing mechanism tells that the medium is free. Figure W6: Condition for medium idleness Virtual carrier sensing is implemented by using two concepts as listed below: - Control frames (or, packets) o Request-To-Send (RTS) frame o Clear-To-Send (CTS) frame - Network Allocation Vector (NAV): This is a scalar, integer variable held by each computer. Suppose that a computer A wants to transmit data to another computer B. Before transmitting the data frame, A transmits an RTS frame to B. The major fields of an RTS frame are: A s and B s addresses and a duration field. The duration field tells B the length of time for which the medium is likely to remain busy due to A s data transmission and B s acknowledgement. An RTS frame is a point-to-point frame in the sense that only B should respond (a CTS frame) to the RTS frame. Also, an RTS frame is a broadcast frame in the sense that all those receiving this frame are supposed to extract the duration field out of the packet to update its NAV, but the unintended receivers do not send back a response (a CTS frame). By transmitting an RTS frame, computer A achieves two objectives as outlined below: - Computer A requests permission from B. - Computer A informs all its neighbors of a likely data transmission within a certain time interval so that the neighbors do not transmit anything within the said interval. If, or when, B receives the RTS frame, it decides whether or not to receive a data frame from A. In case B wants to receive a data frame from A, it responds back to A by transmitting a CTS frame. Contained in the CTS frame will be A s address and the 8
9 duration for which the medium is likely to remain busy around B. All computers, except A, receiving the CTS frame extract the duration value and update their NAV variables. Neighbors of A will receive A s RTS and neighbors of B will receive B s CTS. All computers, except the pair A and B, receiving an RTS or a CTS shall not initiate a transmission in the period denotes the duration fields of the RTS/CTS frames. Computers update and interpret their NAV variables as follows. - Each computer has its own NAV with an initial value of 0. - NAV represents for how long the medium is likely to remain busy. - The unit of time information in NAV is microseconds. - NAV is decremented by 1 with the elapse of each microsecond of real time. - When NAV = 0, it is no more decremented. - NAV is updated using the duration field in a received control frame as follows: o NAV = Max(NAV, duration value received in a control frame) - NAV = 0 means no pre-announced transmission is going on in the vicinity. - Idle medium is defined as absence of carrier AND NAV = 0. Timing relationship between RTS and CTS The hand-shake mechanism using RTS and CTS control frames has been illustrated in Figure W7. In Figure W7 we assume that computer A wants to send a data frame to computer B, C is a computer within the radio range of A, and D is a computer within the radio range of B. We also assume that D is out of range of A, and C is out of range of B. The four frames, namely RTS, CTS, DATA, and ACK, are separated by a time interval known as Short InterFrame Space (SIFS). The idea behind this spacing is to maintain a logical association between these frames. Because of propagation delay and the delay involved in computing a response to a frame, there is a need to have an allowed time gap between logically related frames. For example, when a station, say, B, has successfully received an RTS, it should be given an opportunity to respond back with a CTS without any disturbance from other computers. This is achieved by allowing B to make a decision within SIFS interval and send back a CTS. It may be noted that no other computer within A s and B s transmission range should transmit a packet during the SIFS gaps in Figure W7. This is achieved by having the computers sense the medium to be idle for more than the SIFS interval. (These intervals are known as PIFS Point InterFrame Space and DIFS Distributed IFS.) An important thing in Figure W7 is the concept of acknowledgement (ACK) sent from B to A. If B receives the DATA frame successfully, it sends back an ACK to A. It is useful to recall that there is no such ACK mechanism in the CSMA/CD protocol for Ethernet. The reason for including an ACK at the MAC level in wireless LANs and not having it in the MAC protocol for wired LAN is that the bit error rate (BER) in case of high quality wired LAN is very low, whereas the BER in a wireless environment is comparatively very high. For example, the BER on a fiber link is as low as whereas it is 10-5 on a 9
10 wireless link. If the concept of ACK is not used at the MAC level in a wireless LAN, upper level protocols will have to handle the resulting packet loss. Because of the longer timeouts involved in upper-level protocols and the possibility of loss of retransmitted packets from the upper-level protocols, handling packet loss at the upper-level is much more expensive than the cost involved at the MAC level where the probability of packet error is high. However, if the probability of packet error is extremely low at the PHY level, handling packet error is left to the upper-level protocols due to the extra cost of running the ACK mechanism at the MAC level. Value of duration in RTS A RTS SIFS DATA Value of duration in CTS B SIFS CTS SIFS ACK C Value of NAV of C D Value of NAV of D Time Figure W7: The hand-shake mechanism using RTS/CTS Note: Two computers, by exchanging RTS and CTS frames, inform their neighbors to not initiate a transmission during the period reserved by the RTS/CTS frames. Thus, the neighbors refrain from initiating their own transmissions during the said period and help in avoiding potential collisions. Hence, the RTS/CTS mechanism works to achieve the goal of collision avoidance. 10
11 DCF mode of operation with hand-shake In the following, we give a flow-chart representation of the DCF protocol with handshake. We have already explained the basic concepts used in the protocol, such as the idea of RTS/CTS. We will present the protocol in two parts in the form of a sender s behavior (Figure W8) and a receiver s behavior (Figure W10). 11
12 F: a new data frame to be transmitted i = 0, CW = CW min NAV = 0? End of backoff Idle medium for DIFS interval? No Random Backoff CTS is received ACK is received Yes Send an RTS Start a timer Cancel timer Send DATA (F) Start a timer Timeout Timeout Wait for fairness to others Cancel timer Wait for a random interval i = i+1 CW = CW min *2 i (At some point, CW saturates at CW max.) i: Retry count, CW: Contention Window CWmin: Minimum value of CW (typical value is 32) CWmax: Maximum value of CW (typical value is 256) DIFS: Distributed Interframe Space SIFS < DIFS Important note Figure W8: Hand-shake mode of DCF operation (Sender s behavior) The random backoff protocol (the dotted box in Figure W8) The backoff mechanism in the WLAN protocol works differently from the backoff mechanism in CSMA/CD protocol for Ethernet as follows. - Choose a random number in the range [0, CW]. A variable, called Backoff Time Counter (BTC) is initialized with the chosen random number. The unit of time represented by the BTC variable is denoted by aslottime, where 12
13 aslottime accounts for propagation time and transceiver switching time (switching time between transmitter and receiver and vice versa.) - BTC is decremented by 1 if the channel is idle for aslottime. - Stop decrementing the BTC if the medium is busy. - Resume decrementing the BTC after finding the channel to be idle for DIFS interval. Thus, whenever the channel is found to be busy, decrementing of BTC is done after finding the channel to be idle for DIFS interval immediately after the busy period ends. Once the channel is idle for at least DIFS interval, subsequent decrement is done for each idle period of aslottime interval. (See Figure W9 for an illustration.) - BTC = 0 means that the backoff process has finished. A computer remains in the backoff state for at least BTC time units of real-time and during this period the medium is idle. In Figure W9, we give an example of how BTC is decremented by computer B. We assume that the channel remains busy due to activities of computers A and C. Here, the focus is on how BTC decrements and not on who should transmit when. The random initial value of BTC is assumed to be 5. Note: The reader may note an important relationship between SIFS and DIFS in the form of SIFS < DIFS. In the DCF mode, a computer senses the medium to be idle for at least a DIFS period. Thus, even if the computer finds the medium to be idle for SIFS period between frames in the sequence {RTS, CTS, DATA, ACK}, it does not initiate a transmission in order to not disturb an ongoing communication. Thus, the relationship SIFS < DIFS is very important. A recommended equality relationship between SIFS and DIFS is: DIFS = SIFS + 2*aSlotTime (This relationship will be made clearer in a later part of these notes.) 13
14 Ch. Busy (A) Ch. Busy (C) Time B DIFS DIFS X X X X BTC = If the channel is busy, it has to remain idle for DIFS interval for BTC to be decremented by 1. X = aslottime If the channel is idle for at least DIFS interval, it has to remain idle for aslottime interval for BTC to be decremented by 1. Figure W9: Illustration of how BTC decrements from a random initial value of 5. 14
15 Receive an RTS Remain silent. NAV = 0? No Receive a DATA frame Yes Channel is idle for SIFS and the computer is ready to receive? No Ch. idle for SIFS? Yes No Yes Send an ACK Send a CTS Note: The above two fragments of flow-charts can be easily merged. Figure W10: Hand-shake mode of DCF operation (Receiver s behavior) 15
16 DCF mode of operation without hand-shake The DCF mode of operation without hand-shake is a special case of the DCF mode of operation with hand-shake. In this mode, RTS and CTS frames are not exchanged between two computers before the sender transmits its DATA frame. A receiver must respond to a correctly received DATA frame with an ACK frame. The idea of NAV is still used in this mode of operation. This is because of the fact that even if a computer does not use the hand-shake mode, it must update its NAV if it receives an RTS or a CTS frame from another computer. A network card may implement both the modes of DCF operation and dynamically decide what mode to use on a frame basis. Note: A computer may wish to broadcast a DATA frame to all its neighbors. By broadcast, we mean all the neighbors are the DATA frame s intended receivers. For a DATA frame to be broadcast, we need to remember two points as follows: - A DATA frame is broadcast in the DCF without hand-shake mode. - Receivers of a broadcast frame do not send back ACK frames. Thus, though broadcast operation is a desirable one, there is no guarantee of its reliability at the MAC level, i.e., there is no guarantee that all the neighbors of the sender will receive a copy of a broadcast frame. A broadcast frame is distinguished from a point-topoint DATA frame by using an appropriate addressing mechanism in the header of DATA frame. PCF mode of operation In the PCF mode of operation, an Access Point (AP) is a key element in a WLAN. The AP controls the channel by alternating between the PCF mode and the DCF mode. For an AP to be in full control of the channel, it grabs the channel as follows: - The AP senses the medium to be idle at the beginning of a contention-free (CF) period for a PIFS (PCF InterFrame Space) interval. The PIFS interval has an important relationship with the other two intervals, namely, SIFS and DIFS, in the form of: SIFS < PIFS < DIFS. This is how we interpret the above relationship. Frames in the sequence {RTS, CTS, DATA, ACK} maintain a gap of SIFS. By having SIFS < PIFS, the AP lets an ongoing transmission to be completed before grabbing the channel. By having PIFS < DIFS, we make sure that another computer is prevented from acquiring the channel, thereby giving priority to the AP to grab the channel. This happens because in the DCF mode of operation, a computer must observe the channel to 16
17 be idle for at least DIFS interval. In terms of equality relationships, recommended values of SIFS, PIFS, and DIFS are as follows: PIFS = SIFS + aslottime DIFS = SIFS + 2*aSlotTime - If an AP finds that the medium is idle for a PIFS interval, it transmits a Beacon frame. A Beacon frame contains a CFPMaxDuration field (CFP: Contention-Free Period.) This value communicates the length of the CF period to all stations. Essentially, this value tells the user computers the maximum duration for which the AP will be controlling the medium. Computers receiving a Beacon frame update their NAV value with the CFPMaxDuration value. Consequently, user computers are prevented from taking control of the medium until the end of the CF period. This is because for a user computer to access the medium, first its NAV must reach 0. - After transmitting a Beacon frame, the AP waits for at least one SIFS interval and next transmits one of the following frames: o DATA frame o CF Poll frame o Data+CF Poll frame o ACK frame o CF End frame The above frame types have been explained in the following. - DATA frame: o This frame contains user data from the AP to a particular station. o Upon correctly receiving the DATA frame, a user computer sends back an ACK frame to the AP after an SIFS interval. o If the AP does not receive an ACK, it can retransmit the frame after a PIFS interval. o An AP can also transmit broadcast and multicast DATA frames to all the users or a subset of the users, respectively. o Broadcast and multicast frames are not ACKed. - CF Poll frame (explained in Figure W11): o An AP sends this frame to a computer granting the computer permission to transmit a single DATA frame to any destination the AP or another user computer. o Receiver of the above DATA frame sends back an ACK to the polled computer (This is the computer that sent out the DATA frame.) o If the polled computer has no DATA frame, it must send a null DATA frame. o If a polled station does not receive an ACK, it can not retransmit its data frame unless it is polled again. 17
18 AP User 1 User 2 AP User 1 CF Poll CF Poll SIFS DATA DATA SIFS ACK SIFS SIFS ACK The polled user sends data to another user. The polled user sends data to the AP. Figure W11: CF Poll frame - DATA + CF Poll (See Figure W12.) AP User 1 User 2 DATA+ CF Poll ACK SIFS DATA ACK SIFS The polled user receives data from the AP and sends data to another user. Figure W12: DATA+CF Poll frame 18
19 - CF End: This frame identifies the end of the CF period. This is sent by an AP when one of the following happens: o The AP has no data to transmit and no computer to poll. This can happen before the pre-announced CFPMaxDuration value expires. Thus, the AP can prematurely terminate its CF period by transmitting a CF End frame. When the user computers receive this frame, those reset their NAV to 0. o The CFPDurRemaining time expires. This variable is initialized with the value of CFPMaxDuration that was broadcast in a Beacon frame. As time passes, CFDurRemaining is decremented and its value represents the remaining time for which the AP will be in control of the channel. A computer joining a WLAN with an AP In this part of the notes, we explain how a computer joins a wireless network with an AP. (There is no need for such a protocol in a wired LAN, because by plugging in a new computer to a wired LAN, your computer automatically becomes a part of the LAN.) A station can join a WLAN in one of two ways: - by passive scanning - by active scanning Passive Scanning: A station listens to each channel for a specific period of time. (A channel can be considered as a certain carrier frequency. All the computers and the AP transmit on the same carrier frequency. If the radio ranges of two APs overlap, they use different channels.) Initially, a computer does not know if there is a nearby AP and the channel used by the AP. Thus, it has to listen to each channel for a certain interval. Listening to a channel means waiting to receive a Beacon frame transmitted on the channel. After the computer receives a Beacon frame, the computer can negotiate a connection with the AP by proceeding with the authentication and association processes. Active Scanning: In this mode of joining a WLAN, a computer sends a Probe frame to an AP by using the broadcast mechanism, and waits for a Probe Response from the nearby AP. A Probe Response frame identifies the presence of a network. Once a computer receives a Probe Response frame, it can negotiate a connection with the AP by proceeding with the authentication and association processes. 19
20 Comparison of CSMA/CD MAC for LAN and CSMA/CA MAC for WLAN Finally, we compare the CSMA/CD and CSMA/CA protocols for Ethernet LAN and wireless LAN, respectively. The comparison will focus on the important concepts involved in the design of those protocols. CSMA/CD CSMA/CA (Ethernet (Wireless Features LAN) LAN) Comments Collision Yes No In wireless networks, in general, Detection it is not possible to detect collision. ACK of No Yes In a wireless network, it is important data frames to ACK data frames because of the high BER (bit error rate). Possible use of a central controller No Yes An AP in a WLAN is a central controller. Multi-mode No Yes PCF and DCF (with/without hand-shake) Data transmission Sensitivity to No Yes Short packet: DCF without hand-shake data frame length Long packet: DCF with hand-shake Fairness Yes Yes Achieved using a random wait after successfully transmitting a data frame. Rate of High Low The low rate in WLAN is due to the transmission unreliable characteristic of wireless medium Real-time No Yes An AP in the PCF mode can support traffic support (best effort) time-sensitive traffic. 20
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationWiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
More informationECE 428 Computer Networks and Security
ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software
More information... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More information802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
More information802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
More informationChapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationAn Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e
An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e Jahanzeb Farooq, Bilal Rauf Department of Computing Science Umeå University Sweden Jahanzeb Farooq, 2006 (tipputhegreat@hotmail.com) Chapter
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationTCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationIEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
More informationCollision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationBasic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
More informationA Technical Tutorial on the IEEE 802.11 Protocol
A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview
More informationVideo Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net
Video Transmission over Wireless LAN Hang Liu Hang.liu@thomson.net Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!
More informationMAC Algorithms in Wireless Networks
Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated
More informationFinal Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
More informationISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
More informationA Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
More informationIEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011
IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b
More informationThe Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationPhilippe Klein. avb-phkl-802-11-qos-overview-0811-1
802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationA TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
More information10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
More informationLecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More informationIEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/
WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationAn Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg sgarg@avaya.com Avaya Labs Research Basking Ridge, NJ USA Martin Kappes mkappes@avaya.com Avaya Labs Research
More informationPerformance Analysis of the IEEE 802.11 Wireless LAN Standard 1
Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research
More informationEnhanced TXOP scheme for efficiency improvement of WLAN IEEE 802.11e
Enhanced TXOP scheme for efficiency improvement of WLAN IEEE 802.11e Jakub Majkowski, Ferran Casadevall Palacio Dept. of Signal Theory and Communications Universitat Politècnica de Catalunya (UPC) C/ Jordi
More informationExpress Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
More informationWiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
More informationIEEE 802.11e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.
IEEE 802.11e WLANs / WMM S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. Outline A short review of 802.11 MAC Drawbacks of 802.11 MAC Application
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More informationMustafa Ergen June 2002 ergen@eecs.berkeley.edu. Department of Electrical Engineering and Computer Science University of California Berkeley
Mustafa Ergen June 2002 ergen@eecs.berkeley.edu Department of Electrical Engineering and Computer Science University of California Berkeley 2 Abstract This document describes IEEE 802.11 Wireless Local
More informationWireless LAN Services for Hot-Spot
Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationIEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
More informationImproving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods
Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Song Ci CS Department University of Michigan-Flint Flint, MI48502 cisong@umich.edu Guevara Noubir College
More informationEnhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationNetworks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,
Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
More informationPerformance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks
International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT
More informationDynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
More informationHow To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationLecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
More informationLab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
More informationIntroduction to Ethernet
Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and
More informationMobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de
Mobile Communications Exercise: Satellite Systems and Wireless LANs N 1 Please define the terms inclination and elevation using the following two figures. How do these parameters influence the usefulness
More informationEfficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)
Vol.2, Issue.2, Mar-Apr 2012 pp-078-083 ISSN: 2249-6645 Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) 1 Y V Adi Satyanarayana, 2 Dr. K Padma Raju 1 Y V Adi Satyanarayana, Assoc. Professor,
More informationEECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationRTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
More informationEETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude skangude@lyle.smu.edu Discovery and Beaconing Discovery?
More informationComputer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
More informationHow To Configure the WLAN with QoS
How To Configure the WLAN with QoS Introduction This How to Note explains how to configure Quality of Service (QoS) in a wireless Local Area Network to prioritize traffic under busy conditions. There is
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More informationVoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationCan I add a VoIP call?
Can I add a VoIP call? Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: sgarg@avaya.com Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: mkappes@avaya.com Abstract In this paper, we study the
More informationIEEE 802.11 Wireless Local Area Networks
ABSTRACT The draft IEEE 82. Wireless Local Area Network (WLAN) specification is approaching completion. In this article, the IEEE 82. protocol is explained, with particular emphasis on the medium access
More informationECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
More informationWireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
More informationCS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
More informationRailway Freight Dispatching Telephone System Based on VoIP in Wireless Networks
International Conference on Computer, Communications and Information Technology (CCIT 2014) Railway Freight Dispatching Telephone System Based on VoIP in Wireless Networks Jun Xiao1, Feng Liu1, 2 1 2 School
More informationData Center Networks, Link Layer Wireless (802.11)
Internet-Technologien (CS262) Data Center Networks, Link Layer Wireless (802.11) 1.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6 Wiederholung Warum «multiple access»?
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationSSPC and Data Transfer
Ad Hoc Networks 7 (2009) 1136 1149 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc The slow start power controlled MAC protocol for mobile ad hoc
More informationII. IEEE802.11e EDCA OVERVIEW
The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'7) CACITY IMPROVEMENT OF WIRELESS LAN VOIP USING DISTRIBUTED TRANSMISSION SCHEDULING Kei Igarashi,
More informationFast Retransmission Mechanism for VoIP in IEEE 802.11e wireless LANs
Fast Mechanism for VoIP in IEEE 802.11e wireless LANs Gyung-Ho Hwang and Dong-Ho Cho Division of Electrical Engineering, Department of Electrical Engineering and Computer Science, KAIST, 373-1 Guseong-dong
More informationa. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.
CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
More informationReal-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
More informationOn Backoff Mechanisms for Wireless. Mobile Ad Hoc Networks
On Backoff Mechanisms for Wireless Mobile Ad Hoc Networks A Thesis Submitted By Saher S. Manaseer For The Degree of Doctor of Philosophy To The Faculty of Information and Mathematical Sciences University
More informationRandom Access Protocols
Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori
More informationIEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: g.anastasi@iet.unipi.it E. Borgia, M. Conti, E.
More informationEXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols
EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationWireless Network Measurement: VoIP and 802.11e
Wireless Network Measurement: VoIP and 82.11e by Ian Dangerfield, B.A Masters Thesis Hamilton Institute National University of Ireland Maynooth Maynooth Co. Kildare December 27 Research Supervisor: Dr.
More informationPerformance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
More informationDirect Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)
reas for Discussion Direct Link Networks Joseph Spring School of Computer Science Sc - Computer Network Protocols & rch s ased on Chapter 2, Peterson & Davie, Computer Networks: Systems pproach, 5 th Ed
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationRing Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
More informationIEEE802.11 Wireless LAN
IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players
More information802.11 Arbitration. White Paper. September 2009 Version 1.00. Author: Marcus Burton, CWNE #78 CWNP, Inc. marcus.burton@cwnp.com
802.11 Arbitration White Paper September 2009 Version 1.00 Author: Marcus Burton, CWNE #78 CWNP, Inc. marcus.burton@cwnp.com Technical Reviewer: GT Hill, CWNE #21 gt@gthill.com Copyright 2009 CWNP, Inc.
More informationMobile Ad Hoc Networks
Mobile Ad Hoc Networks 1 Asis Nasipuri Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223-0001 I. INTRODUCTION A mobile ad hoc network is
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationAlgorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
More informationConfiguring QoS in a Wireless Environment
Configuring QoS in a Wireless Environment This chapter describes how to configure quality of service (QoS) on your Cisco wireless interface. With this feature, you can provide preferential treatment to
More informationChapter 6: Medium Access Control Layer
Chapter 6: Medium Access Control Layer Chapter 6: Roadmap Overview! Wireless MAC protocols! Carrier Sense Multiple Access! Multiple Access with Collision Avoidance (MACA) and MACAW! MACA By Invitation!
More information