The MAC layer in wireless networks



Similar documents
Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

MAC Algorithms in Wireless Networks

CSMA/CA. Information Networks p. 1

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

... neither PCF nor CA used in practice

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

Wiereless LAN

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

ECE 333: Introduction to Communication Networks Fall 2002

TCP in Wireless Networks

Random Access Protocols

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Controlled Random Access Methods

How To Make A Multi-User Communication Efficient

Lecture 17: Wireless Networking"

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Philippe Klein. avb-phkl qos-overview

CS263: Wireless Communications and Sensor Networks

ECE 428 Computer Networks and Security

Adaptive DCF of MAC for VoIP services using IEEE networks

CSE 123A Computer Networks

EPL 657 Wireless Networks

Chapter 6: Medium Access Control Layer

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

ECE/CS 372 introduction to computer networks. Lecture 13

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Lecture 7 Multiple Access Protocols and Wireless

Video Transmission over Wireless LAN. Hang Liu

Medium Access Control (MAC) and Wireless LANs

Performance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE Kang Sun

RTT 60.5 msec receiver window size: 32 KB

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

Can I add a VoIP call?

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

How To Determine The Capacity Of An B Network

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Wireless LAN Services for Hot-Spot

Based on Computer Networking, 4 th Edition by Kurose and Ross

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

IEEE Wireless LAN Standard. Updated: 5/10/2011

Ethernet, VLAN, Ethernet Carrier Grade

Performance Analysis of the IEEE Wireless LAN Standard 1

IEEE e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

10. Wireless Networks

An Overview of Wireless LAN Standards IEEE and IEEE e

A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Performance Evaluation of Wired and Wireless Local Area Networks

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

SSPC and Data Transfer

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Mobile Ad Hoc Networks

IEEE Ad Hoc Networks: Performance Measurements

Chapter 7 Low-Speed Wireless Local Area Networks

COMP 3331/9331: Computer Networks and Applications

Real-Time (Paradigms) (51)

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

IEEE WLAN (802.11) ...Copyright. Renato Lo Cigno

How To Solve A Network Problem In An Ipa (Ipa 2) (Ipam) (Networking) (For Acedo) (Ipta) (Powerline) (Network) (Nem

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Enhanced TXOP scheme for efficiency improvement of WLAN IEEE e

Fast Retransmission Mechanism for VoIP in IEEE e wireless LANs

IEEE Technical Tutorial. Introduction. IEEE Architecture

Virtual PCF: Improving VoIP over WLAN performance with legacy clients

Throughput Modeling in IEEE WLAN-based Wireless Networks

Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

Modeling and Simulation of Quality of Service in VoIP Wireless LAN

II. IEEE802.11e EDCA OVERVIEW

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

Introduction VOIP in an Network VOIP 3

Data Center Networks, Link Layer Wireless (802.11)

Yalda Hakki Rosy Johal Renuka Rani

A TCP-like Adaptive Contention Window Scheme for WLAN

A Software Architecture for Simulating IEEE e HCCA

Transcription:

The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when? (and where)? Avoid collisions (no Collision Detection) Scarce resources utilization Channel capacity and battery power performance and QoS System level and (or vs?) user level Frame organization, and intra-, inter-layer information management Cross layering principles for adaptive behavior? Risk for spaghetti design [Kumar2003] [Kumar2003] V. Kawadia, P.R. Kumar, "A Cautionary Perspective on Cross Layer Design", Submitted for publication, 2003 (http://black1.csl.uiuc.edu/~prkumar/) 1 Collision of wireless signals Collision has destructive effect on the receiver...causes both channel and power waste Collision detection is not practical in wireless systems Collision avoidance/resolution + contention control on the sender Capture effect is possible Exploited to enhance channel reuse, if possible Collision domain: set of nodes sharing the same channel Space splitting, transitive relation 2 1

Wireless MAC protocols classification Multiple access protocols Distributed Contention based Contention free deterministic probabilistic Distributed dynamic centralized static deterministic access ID mapping Contention control Contention resolution random access Implicit Reservation Token based Reservation based Fixed TDMA, FDMA, CDMA No Centralized Coordinator, static allocation of resources No Centralized Coordinator, Dynamic allocation of resources No Centralized Coordinator, Dynamic allocation of resources Hybrid Cluster-based definitions MAC? Centralized Coordinator, Static allocation of resources 3 Evolutionary perspective of distributed MAC Distributed, contention-based wireless MAC Problem: the frame vulnerability (collision risk) Needs resolution in distributed way (no centralized coordinator) let s analyze the domain first Aloha [Abramson1970]: no coordination Slotted Aloha CSMA [Kleinrock1975]: listen before to transmit Slotted CSMA CSMA/CD: listen before and while transmitting (unpractical in wireless scenarios) CSMA/CA + contention resolution (reactive resolution of collisions) CSMA/CA + contention control (preventive/reactive reduction of risk of collisions) [Abramson1970] N. Abramson, ``The ALOHA system - another alternative for computer communications'', Proc. Fall Joint Comput. Conf. AFIPS, 1970 [Kleinrock1975] L. Kleinrock, F.A. Tobagi ``Packet Switching in Radio Channels: Part I - Carrier Sense Multiple-Access modes and their throughput-delay characteristics'', IEEE Transactions on Communications, Vol Com-23, No. 12, pp.1400-1416, 1975 4 2

The ALOHA protocol yes Packet ready? transmit no An integral part of the ALOHA protocol is feedback from the receiver Feedback occurs after a packet is sent No coordination among sources wait for a round-trip delay packet transmission k s yes positive ack? no compute random backoff integer k 5 The ALOHA protocol STA i Frame size frame1 ok1 STA j early1 late2 ok2 Collision domain collision early1 Frame1 late2 ok2 ok1 New1+frame1 coll. Frame1+New2 coll. Frame vulnerability : twice the frame size 6 3

Slotted ALOHA Packet ready? no yes Wait for start of next slot transmit wait for a round-trip quantized in slots delay packet transmission k s yes positive ack? no compute random backoff integer k 7 Slotted ALOHA STA i STA j Framesize frame1 slot Propagation delay frame1 frame2 frame2 Collision domain NEW collision frame1 frame1 frame2 Frame1+frame2 collision Frame vulnerability : the frame size (slot + propagation) 8 4

CSMA Protocol Packet ready Channel Busy? no transmit yes wait for a round-trip delay packet transmission k s yes positive ack? no compute random backoff integer k 9 CSMA Protocol STA i Frame size STA j frame1 Propagation delay frame1 early2 Collision domain late2 collision Frame1 detected... late2 NEW early2 late2 frame1 late2 Frame1+late2 vulnerability Frame1+early2 vulnerability Frame vulnerability : twice the propagation delay 10 5

Slotted CSMA Protocol STA i Frame size STA j frame1 Propagation delay frame1 frame2 Collision domain collision Frame1 detected... frame2 frame2 NEW frame1 frame2 Frame1+frame2 vulnerability Frame vulnerability : the propagation delay 11 Throughput comparison 1 Analytical Results 0.9 0.8 Pure CSMA Slotted CSMA 0.7 0.6 S (Throughput) 0.5 0.4 Slotted Aloha 0.3 0.2 Pure Aloha 0.1 0 10-3 10-2 10-1 10 0 10 1 10 2 10 3 10 4 10 5 Offered Load: G 12 6

CSMA/CA: the IEEE 802.11 Wireless LAN 1 Medium Access Control (MAC) protocol: 2 coordination functions co-exist in a superframe structure ( division) Distributed Coordination Function (DCF) Ad-Hoc networks (peer to peer) Distributed control (no base station) contention based access (no QoS, no minimum delay) CSMA/CA access protocol with Binary Exponential Backoff Point Coordination Function (PCF) Centralized control (Base station) Polling based access (soft QoS, minimum delay) minimum bandwidth guarantee Will be analyzed later... 13 Homework challenge Come mettere in ordine (in fila) un numero arbitrario M (sconosciuto a tutti) di persone sulla base di un parametro locale (es. l età) con un algoritmo di complessità O(1) (non funzione di M)? Vincoli del mondo: Tutti vedono lo stesso mondo (diciamo anche solo un singolo muro dello stesso mondo) Tutti hanno lo stesso algoritmo implementato locale Nessuno può comunicare o vedere gli altri Esiste nozione comune di tempo (anche non allineata) 14 7

Homework challenge Soluzione approssimata Genera P_stop(età) Ciclo Fermati=(Rnd()<=P_stop) Fai un passo allontanandoti dal muro Finchè (Fermati==True) P_stop 1 Soluzione esatta (metrica spaziale comune) Genera Distanza(età) [cfr P_stop] Percorri Distanza allontanandoti dal muro 0 0 anni (età minima) 200 anni (upper bound età massima) 15 Evolutionary perspective of distributed MAC Distributed, contention-based wireless MAC Problem: the frame vulnerability (collision risk) Needs resolution in distributed way (no centralized coordinator) let s analyze the Space domain MACA [Karn1990]: /, no carrier sense (MACA-BI, RIMA...) MACAW [Bharghavan et al.1994]: /, no carrier sense and immediate ACK (more reliable and efficient Link Layer Control) FAMA [Fullmer et al.1995]: /, carrier sense + other stuff Main solution: / mechanism Today under some criticisms [Karn1990] P. Karn, ""MACA - A new Channel Access Method for Packet Radio", proc. 9-th Computer Networking Conference, September 1990 [Bharghavan et al. 1994] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, "MACAW: A Media Access Protocol for Wireless LAN's," proc. ACM SIGCOMM'94, pp.212-225, London, 1994 [Fullmer et al. 1995] C.L. Fullmer, J.J. Garcia-Luna-Aceves, "Floor Acquisition Multiple Access (FAMA) for Packet Radio Networks", Proc. ACM Sigcomm'95 Cambridge, MA, 1995 16 8

Hidden and Exposed terminals: / The space domain: Hidden and exposed terminals: space vulnerability / mechanism to contrast Hidden terminals Hidden terminals: B does not sense traffic, but the receiver C cannot receive its packet due to a transmission from A to C (A hidden to B) to seize the channel, according to CSMA/CA, a station transmits a short (request to send) packet and waits for the (Clear to Send) response. A transmit to C and seizes the coverage area C respond with to A (B receive the and does not transmit even if it cannot sense A s transmission) Collision on C A to C A C B D B to D Adopt / Time A C Data B Space 17 / drawbacks / is not a guaranteed solution and it is additional overhead Power asymmetry, detection and interference range >> transmission range A C B 18 9

Ad hoc Multi-hop: Time/Space problems A bi-directional chain of MAC frames TCP streams (Data + Ack) Self-contention (MAC layer problem) Inter-stream self-contention (Data vs. Ack TCP streams) Intra-stream self-contention (same TCP stream) How to obtain coordination? New proposed solutions Fast forward Quick exchange Flow numbering (pre-routing at the MAC layer???) Frame transmission by forward invitation 19 MACA: slotted /, no CS MACA: eliminates the carrier sensing...because the contention is on the receiver! Introduces slotted / (30 bytes each) and slot equals the (and ) duration Allow exploitation of concurrent spatial transmission if the receiver is not exposed to two hidden transmitter terminals Variations: MACA-BI, RIMA (receiver initiated) A Collision on B and C? C to A C B D B to D Adopt / Time A C Data B Space 20 10

MACAW: no cs + slotted / + ACK MACAW: fairness of the backoff procedure MILD + Binary Exponential Backoff Cooperation-based backoff values (space-issues of contention) no carrier sensing before both slotted / Introduces ACK ( DATA ACK) Efficient retransmission policy at Data Link layer Problem: both sender and receiver act as receiver during frame transmissions (no concurrent space exploitation of the channel) Collision on C A to C A C B D B to D Adopt / Time A C Data B Space 21 FAMA: cs + slotted / + ACK FAMA: re-introduces carrier sensing before both slotted / Introduces lower bound for size of / and -dominance Floor acquisition: principle for and space contention Collision on C A to C A C B D B to D Adopt / Time A C Data B Space 22 11

Ad hoc Multi-hop: Time/Space problems Source to destination stream: TCP DATA Destination to Source stream: TCP ACK Time TCP DATA ACK TCP ACK ACK ew Contention DATA ACK ew Contention 23 Ad hoc Multi-hop: Time/Space problems Fast Forward intra-stream Quick Exchange inter-stream Mac addr. 1 Mac addr. 2 Mac addr. 3 Mac addr. 4 Sender s Neighbors Sender Receiver Receiver s Neighbors Time DATA ACK + ACK + DATA NAV () DATA1 NAV () ACK + ACK + DATA NAV (DATA1) ACK1 DATA2 ACK2 NAV (ACK1) ACK 24 12

Modified NAV policy Difs Sifs Difs Sifs Source DATA Source DATA Sifs Sifs ACK Sifs Sifs ACK Destination Destination Others NAV () NAV () NAV (DATA) Others NAV () NAV () NAV (DATA) [ Time ] Defer Access Defer Access 25 CSMA/CA: the IEEE 802.11 Wireless LAN 1 Medium Access Control (MAC) protocol: 2 coordination functions co-exist in a superframe structure ( division) Distributed Coordination Function (DCF) Ad-Hoc networks (peer to peer) Distributed control (no base station) contention based access (no QoS, no minimum delay) CSMA/CA access protocol with Binary Exponential Backoff Point Coordination Function (PCF) Centralized control (Base station) Polling based access (soft QoS, minimum delay) minimum bandwidth guarantee 26 13

IEEE 802.11 MAC protocol architecture contention free services Contention based services MAC sublayer Point Coordination Function (PCF) Distributed Coordination Function (DCF) Fundamental Access Method Physical Layer (PHY) 27 Point coordinated mode (PCF) point coordinated mode is a contention free, optional service can co-exist with the DCF in a superframe structure. central coordinator, i.e. the access point (Beacon) manages stations belonging to its access list. guaranteed to access the channel in a contention-free environment. 28 14

DCF and PCF control: IFS Each station performs a carrier sensing activity when accessing the channel priority is determined by Interframe spaces (IFS): Short IFS (SIFS) < Point IFS (PIFS) < Distributed IFS (DIFS) after a SIFS only the polled station can transmit (or ack) after a PIFS only the Base Station can transmit (and PCF takes control) after a DIFS every station can transmit according to basic access CSMA/CA (DCF restarts) SIFS Poll DCF Trans. 1 PIFS PCF ack DIFS Backoff period (contention) Base station PCF (polling based) (scenario 2) takes control Poll trans. 1 ack Poll trans. 2 ack DCF stations wait for a DIFS... DIFS: restart DCF DCF Trans. 2 ack DCF DCF (scenario 1: no PCF takes control) 29 Point Coordination Function (PCF) during the PCF the base station has priority in accessing the channel Base Station waits for a PIFS after a transmission and takes control (DCF stations must wait for DIFS>PIFS) base station polls stations that reserved the channel at the end of the PCF period the Base Station releases the channel and DCF restarts (after a DIFS) SIFS Poll DCF Trans. 1 PIFS PCF ack DIFS Backoff period (contention) Base station PCF (polling based) (scenario 2) takes control Poll trans. 1 ack Poll trans. 2 ack DCF stations wait for a DIFS... DCF Trans. 2 ack DCF DCF (scenario 1: no PCF takes control) 30 15

Distributed Coordination Function (DCF) Basic Access mode: Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access scheme (listen before transmit) carrier sensing performed to detect ongoing transmissions Binary Exponential Backoff over slotted idle each station randomly selects the transmission slot in a variable sized Contention Window no Collision Detection (CD) SIFS PIFS DIFS Packet Transmitted Backoff period (contention) Backoff period DCF Trans. 1 ack DCF Trans. 2 Ack DCF DCF (scenario 1: no PCF takes control) 31 CSMA/CA Access Mechanism Medium Busy Packet Transmitted SIFS Slot Time DIFS Back-off Window CSMA/CA is an efficient protocol for data traffic, like Ethernet Listen before transmit Always back-off before a transmission or retransmission Designed to provide fair access to the medium 32 16

DCF Backoff procedure Selection of a random Backoff Time CWi=contention window size at the i-th transmission attempt. CWi is doubled after each collision experienced (to reduce the contention) BackoffTime(i)=(Cwi*random())*SlotTime i 1 2 3 4 5 6 7 CW i 15 31 63 127 255 511 1023 Reduction of the Backoff Time After an idle DIFS period from the last transmission, a station decrements its Backoff Time by a Slot_ for each slot where no activity is sensed on the medium. Frozen As soon as the medium is determined to be busy, the backoff procedure is suspended. Transmission When the Backoff Time reaches zero, the station starts the transmission. 33 DCF basic access: overview DIFS DATA SIFS DIFS Successful transmission Source Collision: no CD DIFS L Station A A L Station B B Destination DIFS ACK {L A, L B, L C }= lengths of colliding packets IEEE 802.11 does not implement collision detection Station C L C COLLISION LENGTH collision length = maximum{l A, L B, L C } 34 17

IEEE 802.11 Contention Control Effect of high contention = many collisions 35 IEEE 802.11 Contention Control Information known due to carrier sense...allow to determine the Slot Utilization index: Slot Utilization = Num Busy Slots / Initial Backoff Slot Utilization in [0..1] 36 18

IEEE 802.11 Contention Control Adoption of Slot Utilization in Distributed contention control (DCC) Probability of Transmission = P_T P_T = (1- S_U) Num_Att 37 IEEE 802.11 Contention Control Probabilistic Distributed Contention Control Extends 802.11 MAC Stable (avoids collapse) 38 19

IEEE 802.11 Contention Control DCC => better performance (no overheads) 39 IEEE 802.11 Contention Control DCC => better performance (no overheads) 40 20

IEEE 802.11 Contention Control DCC distributed priority mechanism P_T=(1-S_U) S_U) Num_Att*Prior_Lev 41 IEEE 802.11 Contention Control AOB = optimum performance No need to estimate number of stations 42 21