Wireless LAN (IEEE class of protocol suite)

Size: px
Start display at page:

Download "Wireless LAN (IEEE class of protocol suite)"

Transcription

1 Wireless LAN (IEEE class of protocol suite) In these notes, I will explain the MAC protocols used in constructing wireless LANs using the IEEE class of protocol suites. Specific protocols, such as the , will be discussed because these have been standardized and these are used world-wide. At this point, it is important to note the following assumption made in the design of the CSMA/CD protocol to construct a wired LAN: signal from any computer in a network can reach all computers in the network. In a wired LAN, this assumption must hold for computers to be able to reach each other and for the collision detection mechanism to work. However, in a wireless LAN, the above assumption may not hold. That is, signal from a computer may not reach all the computers in the network. Hence, at the MAC level, we do not go for collision detection. Another consequence of signal not reaching all the computers in a network is that computers in a network may not be able to communicate directly. For two computers to be able to communicate, service of another computer in the network or a fixed infrastructure, namely, an Access Point (AP), is used. C: Computer, AP: Access Point C Radio range of the AP Access Point IEEE protocol C Router To the rest of the network AP Figure WL1: Elements of a wireless LAN (WLAN) A wireless LAN using an Access Point (AP) is shown in Figure W1. An AP is the main part of the infrastructure to support a wireless LAN. An AP is connected to a router, which in turn is connected to the rest of the network and the Internet. One of more APs 1

2 may be connected to the same router as shown in the figure, or different APs may be connected to different routers. The APs as well as user computers are equipped with an identical radio interface commonly known as the IEEE standard interface. The IEEE standard specifies both the PHY (physical) and the MAC layers for constructing a wireless LAN. The PHY layer defines the air interface between two IEEE equipped devices and the MAC layer defines the medium access control protocols to access the shared medium. (There are a variety of the IEEE protocol, such as a, b, g, and e. Protocols such as the , a, b, and g differ only in their PHY part, thereby supporting different levels of bandwidth, whereas all their MAC protocols follow the same principle. On the other hand, the e MAC, which has been designed to support multimedia applications, is different from the above protocols. In these notes, we will not discuss the e protocol for lack of time. However, once one understands the MAC protocol, it is easier to understand the more complex e protocol.) Different modes of operation of IEEE MAC protocol Before discussing the details of the IEEE MAC protocol, it is useful to understand the different modes of operation of the protocol as classified below. Modes of IEEE MAC Distributed Coordination Function (DCF) mode Point Coordination Function (PCF) mode With Hand-shake Without Hand-shake Figure W1: Different modes of operation of MAC protocol in a WLAN PCF mode of operation In this mode of operation, an AP acts as the central controller for all the computers lying within the radio range of the AP. The AP decides who transmits when. Thus, there is no 2

3 contention among computers for medium access. The AP can, but not necessarily, follow a round-robin policy to assign time slots to individual computers, thereby guaranteeing a certain amount of bandwidth to each computer. Because of this guarantee of allocation of bandwidth, this mode of operation can support real-time traffic. However, if the amount of traffics generated by different computers widely vary, this mode is not suitable. This is due to the fact that the AP may allocate bandwidth to a computer which may not have much data to transmit. Finally, the IEEE standard says that implementation of the PCF mode of operation is optional. DCF mode of operation In this mode of operation, the presence of an AP is not essential. For example, computers can communicate among themselves using the DCF mode of operation without the assistance of an AP. In such a case, we say that the computers have formed an ad hoc network, where there is an absence of infrastructure, such as APs. However, to construct a wireless LAN with the capability to connect to the Internet, it is essential to have an AP which is connected to a router as shown in Figure W1. Whether or not there is an AP, in the DCF mode of operation all the computers compete for medium access, because there is no central controller if there is an AP, it does not act as a central controller. Because of contention among computers for medium access, there is no guarantee of bandwidth and there is no bound on message delay. Thus, the DCF mode of operation is not suitable for real-time traffic. Rather, data delivery is made on a best effort basis the network makes an effort to deliver data across the wireless medium, but there is no guarantee of bandwidth or bound on delay. Finally, the IEEE standard says that implementation of the DCF mode of operation is mandatory, that is, the DCF mode of operation must be supported by a network card claiming to implement IEEE Note: We have said that the PCF mode is optional, whereas the DCF mode is mandatory. If an AP implements both the modes, the following is a scenario in which both the modes can be used alternatively. For example, the network can run in the PCF mode for T1 seconds, followed by the DCF mode for T2 seconds, followed by the PCF mode for T1 seconds, and so on. In this manner, all, or, some, computers get a guaranteed bandwidth during the PCF mode, whereas all the computers compete for bandwidth in the DCF mode. Those computers without data to be transmitted will not compete for medium access during the DCF mode, thereby allowing those computers with data to enter the contention phase. PCF DCF PCF DCF PCF.. Time Figure W2: Alternative use of PCF and DCF modes 3

4 DCF with hand-shake In this mode, a sender obtains permission from an intended receiver before transmitting a packet to the receiver. This is achieved by the sender transmitting a Request To Send (RTS) packet to the intended receiver, and the receiver granting permission by transmitting a Clear To Send (CTS) packet back to the sender. The intended receiver may refuse to grant permission by remaining silent, i.e. not transmitting a CTS packet back to the sender. The sequence of RTS and CTS control packets is known as the process of hand-shake. An intended receiver can refuse to receive a packet from the sender for a variety of reasons, such as lack of buffer and lack of interest in communicating with the sender, to name a few. This mode of operation is preferred where the network traffic is high or if the packet to be transmitted is a long one. In either case, if hand-shake is not used, the packet will collide with another packet at the receiver with high probability. Thus, it is recommended to use the hand-shake mode of DCF when traffic is very high in the network or a packet is very long. The flip side of using hand-shake is the extra overhead of exchanging RTS/CTS control frames. Essentially, before transmitting a long packet, a sender not only informs the intended receiver about the upcoming transmission, but also both the sender and the intended receiver inform their neighbors via the RTS and CTS control frames about the upcoming transmission so that the neighbors do not initiate their own transmissions while the packet is being transmitted and acknowledged. (The idea of data packet acknowledgement at the MAC level will be explained in a later part of this section.) DCF without hand-shake In this mode of operation, a sender does not take permission from an intended receiver before transmitting a data packet. That is, RTS/CTS control frames are not exchanged between a sender and a receiver before the sender transmits a data packet. Rather, the sender just transmits the packet when certain medium sensing conditions are satisfied. These conditions will be explained in a later part of these notes. Thus, there is no coordination between a sender and a receiver prior to a data packet being transmitted. This lack of coordination increases the probability of packet collision. If data traffic is low or packets are short, then this mode of data transmission avoids the overhead due to hand-shaking. Note: The two modes of DCF operation, namely with hand-shake and without handshake, are not mutually exclusive. Rather, both coexist, and the two modes can be selected on a packet basis. For example, the dotrtsthreshold variable in the MAC management database can be used to choose a certain mode of operation. The dotrtsthreshold variable is initialized with an integer value representing a threshold packet length in bytes. If the length of a data packet is equal to or greater than the dotrtsthreshold value, then the MAC layer chooses the with hand-shake mode. On the other hand, if the packet length is smaller than the dotrtsthreshold 4

5 value, then the without hand-shake mode is chosen to transmit the data packet. This situation has been further explained in Figure W3. Figure W3 shows that a wireless LAN can alternatively operate in the PCF and DCF modes, and within the same DCF mode duration, a computer can successively transmit two data packets in the without handshake and the with hand-shake modes. PCF DCF PCF DCF PCF.. Time With hand-shake Without handshake }mode of operation of the same computer Figure W3: Alternative use of PCF and DCF modes and consecutive appearances of with hand-shake and without hand-shake modes in the same DCF period. Problems in a wireless LAN There are three problems in a wireless LAN, which are not found in wired LANs. These problems are as follows: - Hidden terminal problem - Exposed terminal problem - Inability to detect collision. Hidden terminal problem Assume that all the computers have identical radio ranges. This assumption is not necessary for the problem to occur. Rather, the problem becomes more frequent in the absence of this assumption. Thus, for simplicity of our explanation, we make this assumption. Let there be three computers A, B, and C as shown in Figure W4. Their relative locations and radio ranges have also been shown in Figure W4. The figure shows that A and B are within each other s radio ranges, and B and C too are within each other s radio ranges. Thus, the direct communications that can happen are between A and B and between B and C. However, A and C are outside each other s radio ranges. Now, assume that C is transmitting to B as shown in the figure. Since C is far away from A, A is unaware of the fact that there is an on-going transmission between B and C. Because of this unawareness, A can potentially start its transmission to B or another computer (not shown in the figure), thereby disturbing C s transmission to B. This disturbance happens because C is hidden from A. Thus, a hidden terminal problem occurs when a computer (A) starts its transmission while being unaware of a far-away located computer s (C s) 5

6 transmission to A s neighbor (B). In other words, the problem can occur if two computers (A and C) have a common neighbor (B), but the two computers can not hear each other s signals. Because users, and, hence their computers, are mobile in a wireless LAN, the hidden terminal problem occurs in a wireless LAN. Suitable measures are taken in the IEEE MAC protocol to address this problem. Tx A B C Figure W4: Illustration of the hidden terminal problem Exposed terminal problem Referring to Figure W5, assume that the pairs of computers (D, A), (A, B), and (B, C) are Neighbors in the sense that D and A are within each other s radio ranges. Let A be transmitting a data packet to D. Because of the broadcast nature of this transmission, the same signal also reaches computer B. However, B is not an intended receiver of A s signal. We also know that C is not receiving A s signal. Thus, it is possible for B to start transmitting a data packet to C without disturbing the ongoing transmission from A to D. However, B does not initiate its transmission, because it is unaware of D s location. B does not know if its transmission to C will cause a collision at D. Hence, B does not initiate its transmission while being exposed to A s signal. This is called the exposed terminal problem. In other words, a computer does not start transmitting if it senses that there is an ongoing transmission. Researchers are investigating this issue so that network performance is improved by allowing an exposed terminal to transmit subject to the condition that it does not disturb an ongoing transmission. D Tx A B C 6

7 Figure W5: Illustration of the exposed terminal problem Inability to detect collision Ideally, a sender should detect collision at a receiver, because it is the collision at the receiver that matters. In a wired LAN, collision is detected at the sender s end by assuming that signals from all computers can reach all other computers. However, this assumption does not hold in a wireless LAN as it has been explained in the context of the hidden terminal problem. Another reason for the difficulty in not being able to detect collision is that many wireless devices use half duplex transceivers to simplify transceiver design. That is, a half-duplex wireless device turns on its transmitter and receiver in an alternating manner. As an example, GSM phones use half-duplex transceivers, and this is facilitated by skewing the up-link (transmitting) channel and the down-link (receiving) channel by three time slots so that the transceiver can switch its mode from a transmitter to a receiver and vice versa. Thus, in a wireless LAN, because of the difficulty in detecting collision, MAC protocols do not rely upon collision detection. Rather, the principle of collision avoidance is utilized. Transmit condition and virtual carrier sensing Before a computer can transmit anything data or control packets it is essential to detect idleness of the medium. In a wired LAN, it was sufficient to detect idleness by sensing the physical medium. However, in a wireless LAN, because of the hidden terminal problem, it is not enough to sense the medium to know whether or not the medium is idle. In addition to carrier sensing at the PHY level, the WLAN MAC protocol uses the concept of virtual carrier sensing to tackle the hidden terminal problem. In virtual carrier sensing, a computer monitors the transmission of all control packets that it can receive, utilizes the duration information contained in those packets, and infers whether or not the medium is idle at its intended receiver. Thus, the medium is said to be idle if the PHY level carrier sensing mechanism detects no carrier and it is inferred from the virtual carrier sensing mechanism that the intended receiver within its radio range is not receiving data. 7

8 Transmit condition Medium is idle Absence of carrier detected by the carrier sensing mechanism at the PHY level. and The virtual carrier sensing mechanism tells that the medium is free. Figure W6: Condition for medium idleness Virtual carrier sensing is implemented by using two concepts as listed below: - Control frames (or, packets) o Request-To-Send (RTS) frame o Clear-To-Send (CTS) frame - Network Allocation Vector (NAV): This is a scalar, integer variable held by each computer. Suppose that a computer A wants to transmit data to another computer B. Before transmitting the data frame, A transmits an RTS frame to B. The major fields of an RTS frame are: A s and B s addresses and a duration field. The duration field tells B the length of time for which the medium is likely to remain busy due to A s data transmission and B s acknowledgement. An RTS frame is a point-to-point frame in the sense that only B should respond (a CTS frame) to the RTS frame. Also, an RTS frame is a broadcast frame in the sense that all those receiving this frame are supposed to extract the duration field out of the packet to update its NAV, but the unintended receivers do not send back a response (a CTS frame). By transmitting an RTS frame, computer A achieves two objectives as outlined below: - Computer A requests permission from B. - Computer A informs all its neighbors of a likely data transmission within a certain time interval so that the neighbors do not transmit anything within the said interval. If, or when, B receives the RTS frame, it decides whether or not to receive a data frame from A. In case B wants to receive a data frame from A, it responds back to A by transmitting a CTS frame. Contained in the CTS frame will be A s address and the 8

9 duration for which the medium is likely to remain busy around B. All computers, except A, receiving the CTS frame extract the duration value and update their NAV variables. Neighbors of A will receive A s RTS and neighbors of B will receive B s CTS. All computers, except the pair A and B, receiving an RTS or a CTS shall not initiate a transmission in the period denotes the duration fields of the RTS/CTS frames. Computers update and interpret their NAV variables as follows. - Each computer has its own NAV with an initial value of 0. - NAV represents for how long the medium is likely to remain busy. - The unit of time information in NAV is microseconds. - NAV is decremented by 1 with the elapse of each microsecond of real time. - When NAV = 0, it is no more decremented. - NAV is updated using the duration field in a received control frame as follows: o NAV = Max(NAV, duration value received in a control frame) - NAV = 0 means no pre-announced transmission is going on in the vicinity. - Idle medium is defined as absence of carrier AND NAV = 0. Timing relationship between RTS and CTS The hand-shake mechanism using RTS and CTS control frames has been illustrated in Figure W7. In Figure W7 we assume that computer A wants to send a data frame to computer B, C is a computer within the radio range of A, and D is a computer within the radio range of B. We also assume that D is out of range of A, and C is out of range of B. The four frames, namely RTS, CTS, DATA, and ACK, are separated by a time interval known as Short InterFrame Space (SIFS). The idea behind this spacing is to maintain a logical association between these frames. Because of propagation delay and the delay involved in computing a response to a frame, there is a need to have an allowed time gap between logically related frames. For example, when a station, say, B, has successfully received an RTS, it should be given an opportunity to respond back with a CTS without any disturbance from other computers. This is achieved by allowing B to make a decision within SIFS interval and send back a CTS. It may be noted that no other computer within A s and B s transmission range should transmit a packet during the SIFS gaps in Figure W7. This is achieved by having the computers sense the medium to be idle for more than the SIFS interval. (These intervals are known as PIFS Point InterFrame Space and DIFS Distributed IFS.) An important thing in Figure W7 is the concept of acknowledgement (ACK) sent from B to A. If B receives the DATA frame successfully, it sends back an ACK to A. It is useful to recall that there is no such ACK mechanism in the CSMA/CD protocol for Ethernet. The reason for including an ACK at the MAC level in wireless LANs and not having it in the MAC protocol for wired LAN is that the bit error rate (BER) in case of high quality wired LAN is very low, whereas the BER in a wireless environment is comparatively very high. For example, the BER on a fiber link is as low as whereas it is 10-5 on a 9

10 wireless link. If the concept of ACK is not used at the MAC level in a wireless LAN, upper level protocols will have to handle the resulting packet loss. Because of the longer timeouts involved in upper-level protocols and the possibility of loss of retransmitted packets from the upper-level protocols, handling packet loss at the upper-level is much more expensive than the cost involved at the MAC level where the probability of packet error is high. However, if the probability of packet error is extremely low at the PHY level, handling packet error is left to the upper-level protocols due to the extra cost of running the ACK mechanism at the MAC level. Value of duration in RTS A RTS SIFS DATA Value of duration in CTS B SIFS CTS SIFS ACK C Value of NAV of C D Value of NAV of D Time Figure W7: The hand-shake mechanism using RTS/CTS Note: Two computers, by exchanging RTS and CTS frames, inform their neighbors to not initiate a transmission during the period reserved by the RTS/CTS frames. Thus, the neighbors refrain from initiating their own transmissions during the said period and help in avoiding potential collisions. Hence, the RTS/CTS mechanism works to achieve the goal of collision avoidance. 10

11 DCF mode of operation with hand-shake In the following, we give a flow-chart representation of the DCF protocol with handshake. We have already explained the basic concepts used in the protocol, such as the idea of RTS/CTS. We will present the protocol in two parts in the form of a sender s behavior (Figure W8) and a receiver s behavior (Figure W10). 11

12 F: a new data frame to be transmitted i = 0, CW = CW min NAV = 0? End of backoff Idle medium for DIFS interval? No Random Backoff CTS is received ACK is received Yes Send an RTS Start a timer Cancel timer Send DATA (F) Start a timer Timeout Timeout Wait for fairness to others Cancel timer Wait for a random interval i = i+1 CW = CW min *2 i (At some point, CW saturates at CW max.) i: Retry count, CW: Contention Window CWmin: Minimum value of CW (typical value is 32) CWmax: Maximum value of CW (typical value is 256) DIFS: Distributed Interframe Space SIFS < DIFS Important note Figure W8: Hand-shake mode of DCF operation (Sender s behavior) The random backoff protocol (the dotted box in Figure W8) The backoff mechanism in the WLAN protocol works differently from the backoff mechanism in CSMA/CD protocol for Ethernet as follows. - Choose a random number in the range [0, CW]. A variable, called Backoff Time Counter (BTC) is initialized with the chosen random number. The unit of time represented by the BTC variable is denoted by aslottime, where 12

13 aslottime accounts for propagation time and transceiver switching time (switching time between transmitter and receiver and vice versa.) - BTC is decremented by 1 if the channel is idle for aslottime. - Stop decrementing the BTC if the medium is busy. - Resume decrementing the BTC after finding the channel to be idle for DIFS interval. Thus, whenever the channel is found to be busy, decrementing of BTC is done after finding the channel to be idle for DIFS interval immediately after the busy period ends. Once the channel is idle for at least DIFS interval, subsequent decrement is done for each idle period of aslottime interval. (See Figure W9 for an illustration.) - BTC = 0 means that the backoff process has finished. A computer remains in the backoff state for at least BTC time units of real-time and during this period the medium is idle. In Figure W9, we give an example of how BTC is decremented by computer B. We assume that the channel remains busy due to activities of computers A and C. Here, the focus is on how BTC decrements and not on who should transmit when. The random initial value of BTC is assumed to be 5. Note: The reader may note an important relationship between SIFS and DIFS in the form of SIFS < DIFS. In the DCF mode, a computer senses the medium to be idle for at least a DIFS period. Thus, even if the computer finds the medium to be idle for SIFS period between frames in the sequence {RTS, CTS, DATA, ACK}, it does not initiate a transmission in order to not disturb an ongoing communication. Thus, the relationship SIFS < DIFS is very important. A recommended equality relationship between SIFS and DIFS is: DIFS = SIFS + 2*aSlotTime (This relationship will be made clearer in a later part of these notes.) 13

14 Ch. Busy (A) Ch. Busy (C) Time B DIFS DIFS X X X X BTC = If the channel is busy, it has to remain idle for DIFS interval for BTC to be decremented by 1. X = aslottime If the channel is idle for at least DIFS interval, it has to remain idle for aslottime interval for BTC to be decremented by 1. Figure W9: Illustration of how BTC decrements from a random initial value of 5. 14

15 Receive an RTS Remain silent. NAV = 0? No Receive a DATA frame Yes Channel is idle for SIFS and the computer is ready to receive? No Ch. idle for SIFS? Yes No Yes Send an ACK Send a CTS Note: The above two fragments of flow-charts can be easily merged. Figure W10: Hand-shake mode of DCF operation (Receiver s behavior) 15

16 DCF mode of operation without hand-shake The DCF mode of operation without hand-shake is a special case of the DCF mode of operation with hand-shake. In this mode, RTS and CTS frames are not exchanged between two computers before the sender transmits its DATA frame. A receiver must respond to a correctly received DATA frame with an ACK frame. The idea of NAV is still used in this mode of operation. This is because of the fact that even if a computer does not use the hand-shake mode, it must update its NAV if it receives an RTS or a CTS frame from another computer. A network card may implement both the modes of DCF operation and dynamically decide what mode to use on a frame basis. Note: A computer may wish to broadcast a DATA frame to all its neighbors. By broadcast, we mean all the neighbors are the DATA frame s intended receivers. For a DATA frame to be broadcast, we need to remember two points as follows: - A DATA frame is broadcast in the DCF without hand-shake mode. - Receivers of a broadcast frame do not send back ACK frames. Thus, though broadcast operation is a desirable one, there is no guarantee of its reliability at the MAC level, i.e., there is no guarantee that all the neighbors of the sender will receive a copy of a broadcast frame. A broadcast frame is distinguished from a point-topoint DATA frame by using an appropriate addressing mechanism in the header of DATA frame. PCF mode of operation In the PCF mode of operation, an Access Point (AP) is a key element in a WLAN. The AP controls the channel by alternating between the PCF mode and the DCF mode. For an AP to be in full control of the channel, it grabs the channel as follows: - The AP senses the medium to be idle at the beginning of a contention-free (CF) period for a PIFS (PCF InterFrame Space) interval. The PIFS interval has an important relationship with the other two intervals, namely, SIFS and DIFS, in the form of: SIFS < PIFS < DIFS. This is how we interpret the above relationship. Frames in the sequence {RTS, CTS, DATA, ACK} maintain a gap of SIFS. By having SIFS < PIFS, the AP lets an ongoing transmission to be completed before grabbing the channel. By having PIFS < DIFS, we make sure that another computer is prevented from acquiring the channel, thereby giving priority to the AP to grab the channel. This happens because in the DCF mode of operation, a computer must observe the channel to 16

17 be idle for at least DIFS interval. In terms of equality relationships, recommended values of SIFS, PIFS, and DIFS are as follows: PIFS = SIFS + aslottime DIFS = SIFS + 2*aSlotTime - If an AP finds that the medium is idle for a PIFS interval, it transmits a Beacon frame. A Beacon frame contains a CFPMaxDuration field (CFP: Contention-Free Period.) This value communicates the length of the CF period to all stations. Essentially, this value tells the user computers the maximum duration for which the AP will be controlling the medium. Computers receiving a Beacon frame update their NAV value with the CFPMaxDuration value. Consequently, user computers are prevented from taking control of the medium until the end of the CF period. This is because for a user computer to access the medium, first its NAV must reach 0. - After transmitting a Beacon frame, the AP waits for at least one SIFS interval and next transmits one of the following frames: o DATA frame o CF Poll frame o Data+CF Poll frame o ACK frame o CF End frame The above frame types have been explained in the following. - DATA frame: o This frame contains user data from the AP to a particular station. o Upon correctly receiving the DATA frame, a user computer sends back an ACK frame to the AP after an SIFS interval. o If the AP does not receive an ACK, it can retransmit the frame after a PIFS interval. o An AP can also transmit broadcast and multicast DATA frames to all the users or a subset of the users, respectively. o Broadcast and multicast frames are not ACKed. - CF Poll frame (explained in Figure W11): o An AP sends this frame to a computer granting the computer permission to transmit a single DATA frame to any destination the AP or another user computer. o Receiver of the above DATA frame sends back an ACK to the polled computer (This is the computer that sent out the DATA frame.) o If the polled computer has no DATA frame, it must send a null DATA frame. o If a polled station does not receive an ACK, it can not retransmit its data frame unless it is polled again. 17

18 AP User 1 User 2 AP User 1 CF Poll CF Poll SIFS DATA DATA SIFS ACK SIFS SIFS ACK The polled user sends data to another user. The polled user sends data to the AP. Figure W11: CF Poll frame - DATA + CF Poll (See Figure W12.) AP User 1 User 2 DATA+ CF Poll ACK SIFS DATA ACK SIFS The polled user receives data from the AP and sends data to another user. Figure W12: DATA+CF Poll frame 18

19 - CF End: This frame identifies the end of the CF period. This is sent by an AP when one of the following happens: o The AP has no data to transmit and no computer to poll. This can happen before the pre-announced CFPMaxDuration value expires. Thus, the AP can prematurely terminate its CF period by transmitting a CF End frame. When the user computers receive this frame, those reset their NAV to 0. o The CFPDurRemaining time expires. This variable is initialized with the value of CFPMaxDuration that was broadcast in a Beacon frame. As time passes, CFDurRemaining is decremented and its value represents the remaining time for which the AP will be in control of the channel. A computer joining a WLAN with an AP In this part of the notes, we explain how a computer joins a wireless network with an AP. (There is no need for such a protocol in a wired LAN, because by plugging in a new computer to a wired LAN, your computer automatically becomes a part of the LAN.) A station can join a WLAN in one of two ways: - by passive scanning - by active scanning Passive Scanning: A station listens to each channel for a specific period of time. (A channel can be considered as a certain carrier frequency. All the computers and the AP transmit on the same carrier frequency. If the radio ranges of two APs overlap, they use different channels.) Initially, a computer does not know if there is a nearby AP and the channel used by the AP. Thus, it has to listen to each channel for a certain interval. Listening to a channel means waiting to receive a Beacon frame transmitted on the channel. After the computer receives a Beacon frame, the computer can negotiate a connection with the AP by proceeding with the authentication and association processes. Active Scanning: In this mode of joining a WLAN, a computer sends a Probe frame to an AP by using the broadcast mechanism, and waits for a Probe Response from the nearby AP. A Probe Response frame identifies the presence of a network. Once a computer receives a Probe Response frame, it can negotiate a connection with the AP by proceeding with the authentication and association processes. 19

20 Comparison of CSMA/CD MAC for LAN and CSMA/CA MAC for WLAN Finally, we compare the CSMA/CD and CSMA/CA protocols for Ethernet LAN and wireless LAN, respectively. The comparison will focus on the important concepts involved in the design of those protocols. CSMA/CD CSMA/CA (Ethernet (Wireless Features LAN) LAN) Comments Collision Yes No In wireless networks, in general, Detection it is not possible to detect collision. ACK of No Yes In a wireless network, it is important data frames to ACK data frames because of the high BER (bit error rate). Possible use of a central controller No Yes An AP in a WLAN is a central controller. Multi-mode No Yes PCF and DCF (with/without hand-shake) Data transmission Sensitivity to No Yes Short packet: DCF without hand-shake data frame length Long packet: DCF with hand-shake Fairness Yes Yes Achieved using a random wait after successfully transmitting a data frame. Rate of High Low The low rate in WLAN is due to the transmission unreliable characteristic of wireless medium Real-time No Yes An AP in the PCF mode can support traffic support (best effort) time-sensitive traffic. 20

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

Wiereless LAN 802.11

Wiereless LAN 802.11 Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

More information

ECE 428 Computer Networks and Security

ECE 428 Computer Networks and Security ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak 802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

More information

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved 802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e

An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e Jahanzeb Farooq, Bilal Rauf Department of Computing Science Umeå University Sweden Jahanzeb Farooq, 2006 (tipputhegreat@hotmail.com) Chapter

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Basic processes in IEEE802.11 networks

Basic processes in IEEE802.11 networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device

More information

A Technical Tutorial on the IEEE 802.11 Protocol

A Technical Tutorial on the IEEE 802.11 Protocol A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview

More information

Video Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net

Video Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net Video Transmission over Wireless LAN Hang Liu Hang.liu@thomson.net Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!

More information

MAC Algorithms in Wireless Networks

MAC Algorithms in Wireless Networks Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,

More information

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011

IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011 IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Philippe Klein. avb-phkl-802-11-qos-overview-0811-1

Philippe Klein. avb-phkl-802-11-qos-overview-0811-1 802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

A TCP-like Adaptive Contention Window Scheme for WLAN

A TCP-like Adaptive Contention Window Scheme for WLAN A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/

IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/ WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg sgarg@avaya.com Avaya Labs Research Basking Ridge, NJ USA Martin Kappes mkappes@avaya.com Avaya Labs Research

More information

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1 Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research

More information

Enhanced TXOP scheme for efficiency improvement of WLAN IEEE 802.11e

Enhanced TXOP scheme for efficiency improvement of WLAN IEEE 802.11e Enhanced TXOP scheme for efficiency improvement of WLAN IEEE 802.11e Jakub Majkowski, Ferran Casadevall Palacio Dept. of Signal Theory and Communications Universitat Politècnica de Catalunya (UPC) C/ Jordi

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

IEEE 802.11e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

IEEE 802.11e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. IEEE 802.11e WLANs / WMM S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. Outline A short review of 802.11 MAC Drawbacks of 802.11 MAC Application

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

Mustafa Ergen June 2002 ergen@eecs.berkeley.edu. Department of Electrical Engineering and Computer Science University of California Berkeley

Mustafa Ergen June 2002 ergen@eecs.berkeley.edu. Department of Electrical Engineering and Computer Science University of California Berkeley Mustafa Ergen June 2002 ergen@eecs.berkeley.edu Department of Electrical Engineering and Computer Science University of California Berkeley 2 Abstract This document describes IEEE 802.11 Wireless Local

More information

Wireless LAN Services for Hot-Spot

Wireless LAN Services for Hot-Spot Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC. IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit

More information

Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods

Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Song Ci CS Department University of Michigan-Flint Flint, MI48502 cisong@umich.edu Guevara Noubir College

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets

More information

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

How To Determine The Capacity Of An 802.11B Network

How To Determine The Capacity Of An 802.11B Network Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

Lecture 7 Multiple Access Protocols and Wireless

Lecture 7 Multiple Access Protocols and Wireless Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de Mobile Communications Exercise: Satellite Systems and Wireless LANs N 1 Please define the terms inclination and elevation using the following two figures. How do these parameters influence the usefulness

More information

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) Vol.2, Issue.2, Mar-Apr 2012 pp-078-083 ISSN: 2249-6645 Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) 1 Y V Adi Satyanarayana, 2 Dr. K Padma Raju 1 Y V Adi Satyanarayana, Assoc. Professor,

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

RTT 60.5 msec receiver window size: 32 KB

RTT 60.5 msec receiver window size: 32 KB Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

More information

EETS 8316 Wireless Networks Fall 2013

EETS 8316 Wireless Networks Fall 2013 EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude skangude@lyle.smu.edu Discovery and Beaconing Discovery?

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

How To Configure the WLAN with QoS

How To Configure the WLAN with QoS How To Configure the WLAN with QoS Introduction This How to Note explains how to configure Quality of Service (QoS) in a wireless Local Area Network to prioritize traffic under busy conditions. There is

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Can I add a VoIP call?

Can I add a VoIP call? Can I add a VoIP call? Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: sgarg@avaya.com Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: mkappes@avaya.com Abstract In this paper, we study the

More information

IEEE 802.11 Wireless Local Area Networks

IEEE 802.11 Wireless Local Area Networks ABSTRACT The draft IEEE 82. Wireless Local Area Network (WLAN) specification is approaching completion. In this article, the IEEE 82. protocol is explained, with particular emphasis on the medium access

More information

ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

Railway Freight Dispatching Telephone System Based on VoIP in Wireless Networks

Railway Freight Dispatching Telephone System Based on VoIP in Wireless Networks International Conference on Computer, Communications and Information Technology (CCIT 2014) Railway Freight Dispatching Telephone System Based on VoIP in Wireless Networks Jun Xiao1, Feng Liu1, 2 1 2 School

More information

Data Center Networks, Link Layer Wireless (802.11)

Data Center Networks, Link Layer Wireless (802.11) Internet-Technologien (CS262) Data Center Networks, Link Layer Wireless (802.11) 1.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6 Wiederholung Warum «multiple access»?

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

SSPC and Data Transfer

SSPC and Data Transfer Ad Hoc Networks 7 (2009) 1136 1149 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc The slow start power controlled MAC protocol for mobile ad hoc

More information

II. IEEE802.11e EDCA OVERVIEW

II. IEEE802.11e EDCA OVERVIEW The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'7) CACITY IMPROVEMENT OF WIRELESS LAN VOIP USING DISTRIBUTED TRANSMISSION SCHEDULING Kei Igarashi,

More information

Fast Retransmission Mechanism for VoIP in IEEE 802.11e wireless LANs

Fast Retransmission Mechanism for VoIP in IEEE 802.11e wireless LANs Fast Mechanism for VoIP in IEEE 802.11e wireless LANs Gyung-Ho Hwang and Dong-Ho Cho Division of Electrical Engineering, Department of Electrical Engineering and Computer Science, KAIST, 373-1 Guseong-dong

More information

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)

More information

Real-Time (Paradigms) (51)

Real-Time (Paradigms) (51) Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

More information

On Backoff Mechanisms for Wireless. Mobile Ad Hoc Networks

On Backoff Mechanisms for Wireless. Mobile Ad Hoc Networks On Backoff Mechanisms for Wireless Mobile Ad Hoc Networks A Thesis Submitted By Saher S. Manaseer For The Degree of Doctor of Philosophy To The Faculty of Information and Mathematical Sciences University

More information

Random Access Protocols

Random Access Protocols Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori

More information

IEEE 802.11 Ad Hoc Networks: Performance Measurements

IEEE 802.11 Ad Hoc Networks: Performance Measurements IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: g.anastasi@iet.unipi.it E. Borgia, M. Conti, E.

More information

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Wireless Network Measurement: VoIP and 802.11e

Wireless Network Measurement: VoIP and 802.11e Wireless Network Measurement: VoIP and 82.11e by Ian Dangerfield, B.A Masters Thesis Hamilton Institute National University of Ireland Maynooth Maynooth Co. Kildare December 27 Research Supervisor: Dr.

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6) reas for Discussion Direct Link Networks Joseph Spring School of Computer Science Sc - Computer Network Protocols & rch s ased on Chapter 2, Peterson & Davie, Computer Networks: Systems pproach, 5 th Ed

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

IEEE802.11 Wireless LAN

IEEE802.11 Wireless LAN IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players

More information

802.11 Arbitration. White Paper. September 2009 Version 1.00. Author: Marcus Burton, CWNE #78 CWNP, Inc. marcus.burton@cwnp.com

802.11 Arbitration. White Paper. September 2009 Version 1.00. Author: Marcus Burton, CWNE #78 CWNP, Inc. marcus.burton@cwnp.com 802.11 Arbitration White Paper September 2009 Version 1.00 Author: Marcus Burton, CWNE #78 CWNP, Inc. marcus.burton@cwnp.com Technical Reviewer: GT Hill, CWNE #21 gt@gthill.com Copyright 2009 CWNP, Inc.

More information

Mobile Ad Hoc Networks

Mobile Ad Hoc Networks Mobile Ad Hoc Networks 1 Asis Nasipuri Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223-0001 I. INTRODUCTION A mobile ad hoc network is

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

Configuring QoS in a Wireless Environment

Configuring QoS in a Wireless Environment Configuring QoS in a Wireless Environment This chapter describes how to configure quality of service (QoS) on your Cisco wireless interface. With this feature, you can provide preferential treatment to

More information

Chapter 6: Medium Access Control Layer

Chapter 6: Medium Access Control Layer Chapter 6: Medium Access Control Layer Chapter 6: Roadmap Overview! Wireless MAC protocols! Carrier Sense Multiple Access! Multiple Access with Collision Avoidance (MACA) and MACAW! MACA By Invitation!

More information