CSMA/CA. Information Networks p. 1



Similar documents
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Wiereless LAN

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

... neither PCF nor CA used in practice

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Chapter 7 Low-Speed Wireless Local Area Networks

Adaptive DCF of MAC for VoIP services using IEEE networks

IEEE Wireless LAN Standard. Updated: 5/10/2011

An Overview of Wireless LAN Standards IEEE and IEEE e

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

IEEE Technical Tutorial. Introduction. IEEE Architecture

Lecture 17: Wireless Networking"

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Basic processes in IEEE networks

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

ECE 428 Computer Networks and Security

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

MAC Algorithms in Wireless Networks

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

TCP in Wireless Networks

A Technical Tutorial on the IEEE Protocol

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

IEEE WLAN (802.11) ...Copyright. Renato Lo Cigno

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

Philippe Klein. avb-phkl qos-overview

Wireless LAN Services for Hot-Spot

Video Transmission over Wireless LAN. Hang Liu

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

How To Determine The Capacity Of An B Network

10. Wireless Networks

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

A TCP-like Adaptive Contention Window Scheme for WLAN

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Random Access Protocols

IEEE e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Based on Computer Networking, 4 th Edition by Kurose and Ross

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

COMP 3331/9331: Computer Networks and Applications

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Lecture 7 Multiple Access Protocols and Wireless

Department of Computer Science Columbia University

IEEE Wireless LAN

Wireless LAN Concepts

Can I add a VoIP call?

Performance Analysis of the IEEE Wireless LAN Standard 1

Medium Access Control (MAC) and Wireless LANs

Arbitration. White Paper. September 2009 Version Author: Marcus Burton, CWNE #78 CWNP, Inc.

Algorithms for Interference Sensing in Optical CDMA Networks

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)

Enhanced TXOP scheme for efficiency improvement of WLAN IEEE e

Wi-Fi Capacity Analysis for ac and n: Theory & Practice

IEEE Ad Hoc Networks: Performance Measurements

Solutions to Performance Problems in VoIP over Wireless LAN 1

WI-FI TECHNOLOGY: SECURITY ISSUES

How To Analyze The Security On An Ipa Wireless Sensor Network

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

EPL 657 Wireless Networks

Wireless Local Area Networks and the Standard

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Virtual PCF: Improving VoIP over WLAN performance with legacy clients

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO

Throughput Modeling in IEEE WLAN-based Wireless Networks

Transport Layer Protocols

SSPC and Data Transfer

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

RTT 60.5 msec receiver window size: 32 KB

Railway Freight Dispatching Telephone System Based on VoIP in Wireless Networks

Fast Retransmission Mechanism for VoIP in IEEE e wireless LANs

Data Center Networks, Link Layer Wireless (802.11)

Measuring the service level in the 2.4 GHz ISM band

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

ECE/CS 372 introduction to computer networks. Lecture 13

How To Configure the WLAN with QoS

Modeling and Simulation of Quality of Service in VoIP Wireless LAN

The Wireless Network Road Trip

EETS 8316 Wireless Networks Fall 2013

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

Solutions to performance problems in VoIP over a wireless LAN

VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN

II. IEEE802.11e EDCA OVERVIEW

ROUTING IN MIXED WIRED AND WIRELESS NETWORKS

How To Make A Multi-User Communication Efficient

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

11/22/

Transcription:

Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not used since a node is unable to detect the channel and transmit data simultaneously A node listens to the channel before transmission to determine whether some one else is transmitting The receiving node sends an acknowledge packet (ACK) a short time interval after receiving the packet If an ACK is not received, the packet is considered lost and a retransmission is arranged

Information Networks p. 2 DCF basic access DCF consists of a basic access mode as well as an optional RTS/CTS access mode In basic access mode the node senses the channel to determine whether another node is transmitting before initiating a transmission If the medium is sensed to be free for a DCF inter-frame space (DIFS) time interval the transmission will proceed If the medium is busy the node defers its transmission until the end of the current transmission and then it will wait an additional DIFS interval and generate a random backoff delay uniformly chosen in the range [0,W 1] where W is called the backoff window or contention window (CW)

Information Networks p. 3 DCF basic access The backoff timer is decreased as long as the medium is sensed to be idle for a DIFS, and frozen when a transmission is detected on the medium, and resumed when the channel is detected as idle again for a DIFS interval When the backoff reaches 0, the station transmits it packet For IEEE 802.11 time is slotted in a basic time unit which is the time needed to detect the transmission of a packet from any other station The initial CW is set to W = 1, if two or more nodes decrease their backoff timer to 0 at the same time a collision occur, at this situation the CW is doubled for each retransmission until it reaches a maximum value

Information Networks p. 4 DCF basic access A short inter-frame space (SIFS) is used to give priority access to ACK packets When receiving a packet correctly, the destination node waits for a SIFS interval immediately after the reception has completed and transmits an ACK back to the source node confirming the correct reception If the source node does not receive an ACK due to collision or transmission errors it reactivates the backoff algorithm after the channel remains idle for an extended IFS (EIFS) interval

Information Networks p. 5 WLAN carrier sensing Carrier sensing is done in two ways, physical carrier sensing by detecting activity on the radio interface, and virtual carrier sensing which is performed by the DCF RTS/CTS access mode To implement virtual carrier sensing each node sends duration information in the header of request-to-send (RTS) and clear-to-send (CTS) packets The duration information indicates the amount of time the medium is to be reserved for transmitting the data and returning ACK packets after the end of current frame

Information Networks p. 6 WLAN carrier sensing The stations in the same basic service set (BSS) uses this information to update its network allocation vector (NAV) that represents the amount of time it has to defer in accessing the medium By using virtual carrier sending all nodes within the same BSS learn how long the channel will be used for this data transmission This solves the problem of a hidden node, a third node that may not be able to receive the RTS from the sending node will hear the CTS from the receiving node and the channel will be reserved for the transmission

Information Networks p. 7 DCF RTS/CTS access mode In RTS/CTS access mode, prior to the data transmission the sending node will send a RTS packet to announce the upcoming transmission When the destination node receives the RTS it will send a CTS packet after a SIFS interval Both the RTS and CTS packets are short control packets The sending node is allowed to transmit its data packet only if it receives the CTS packet correctly The purpose of this RTS/CTS exchange is to avoid long collisions since we don t have collision detection

Information Networks p. 8 Exponential backoff scheme Whenever a backoff occurs the backoff time is uniformly chosen in the range [0,W 1] After each unsuccessful transmission the backoff windows size is doubled, up to a maximum value Once the backoff window size reaches its maximum value it will stay at that value until it is reset The value of W will be reset after every successful transmission of a data or RTS packet, or when a retry counter reaches its limit Since W is used to control the backoff counter its value will affect the performance of the DCF protocol, improvements can be made by choosing better update rules than in IEEE 802.11 standard

Information Networks p. 9 WLAN operating modes The IEEE 802.11 standard specifies two operating modes, either ad hoc mode (peer-to-peer) or infrastructure mode (peer-to-ap) The former is used when connecting a number of wireless nodes, e.g. for a temporary network at a meeting or for connecting a few wireless appliances The latter have one special node, the Access point (AP) which is an Ethernet switch and provides access to a subnet with wire access In infrastructure mode all communication between nodes or between a node and the wired network go through the AP

Information Networks p. 10 WLAN operating modes A basic service set (BSS) are a collection of nodes that have recognized each other and established communication It is also possible to have an extended service set (ESS) consisting of a series of overlapping BSSs (each containing an AP) and the APs are connected together by means of a Distribution System (DS) which in practice is an Ethernet LAN but could be any type of network All nodes within a BSS are synchronized by periodic transmission of time stamped beacon packets, in infrastructure mode the AP is the timing master and generates all timing beacons

Information Networks p. 11 PCF access method In addition to the mandatory DCF access method there is an optional extension called the point coordination function (PCF) In PCF the nodes in a BSS is polled by the AP, providing a time division multiplexing mode for delay sensitive connection-oriented services

Information Networks p. 12 Maximum throughput 802.11 Assuming one peer communicating with an AP using TCP protocol (e.g. transferring file with ftp, fetching web-page with http). Assume that each TCP data packet is followed by a TCP ACK packet. To transfer the data segment there will be Silence during at least one DIFS slot, signaling that the medium is available. More than one if the node is executing back-off. The data frame containing the TCP data. A SIFS gap between data frame and 802.11 ACK frame. The 802.11 ACK frame.

Information Networks p. 13 Maximum throughput 802.11 To transfer the TCP ACK packet there will be Silence during at least one DIFS slot, signaling that the medium is available. More than one if the node is executing back-off. The data frame containing the TCP ACK. A SIFS gap between data frame and 802.11 ACK frame. 802.11 ACK frame. In addition to the payload data, the data frame has additional 36 bytes of data, out of those 28 bytes are 802.11 MAC header for various control and management, error detection and addressing. The other 8 bytes are a header to identify network layer protocol.

Information Networks p. 14 Maximum throughput 802.11 To transfer 1460 bytes of payload, we have an packet with 1500 bytes of data including the TCP/IP headers, and 1536 bytes including the MAC and SNAP header. For the TCP ACK packet of 40 bytes TCP/IP header, there is also an additional 36 bytes for MAC and SNAP header, so total 76 bytes for the TCP ACK. We neglect media contention and backoff times and retransmissions

Information Networks p. 15 Maximum throughput 802.11b SIFS = 10µs, Slot time = 20µs, DIFS = 2 Slot time + SIFS = 50µs Every data frame has a preamble of 192µs 802.11 ACK packet is 14 bytes Data rate is 1.375Msymbols/s, where each symbol is 8 bits, i.e. 11Mbit/s. TCP data packet is thus = DIFS + 802.11 data + SIFS + 802.11 ACK = 50µs + 192µs + 1536/1.375 + 10µs + 192µs + 14/1.375 = 50µs + 1310µs + 10µs + 203µs = 1573µs TCP ACK packet is = DIFS + data + SIFS + 802.11 ACK = 50µs + 192µs + 76/1.375 + 10µs + 203µs = 50µs + 248µs + 10µs + 203µs = 511µs

Information Networks p. 16 Maximum throughput 802.11b In total we have 2084µs to transmit 1460 bytes of payload, which gives us a throughput of 5.6Mbit/s.

Information Networks p. 17 Maximum throughput 802.11g SIFS = 10µs, Short slot time (802.11g-only) = 9µs, Long slot time = 20µs, DIFS = 2 Slot time + SIFS Every data frame has a preamble of 20µs and a signal extension of 6µs at the end of each packet. 802.11 ACK packet is 14 bytes Data rate is 0.25Msymbols/s, where each symbol is 216 bits, i.e. 54Mbit/s, each symbol takes 4µs. TCP data packet is 1536 bytes = 12288 bits so we need 57 symbols to transmit it, the 802.11 ACK of 14 bytes = 112 bits needs one symbol, TCP ACK of 76 bytes = 608 bits needs 3 symbols.

Information Networks p. 18 Maximum throughput 802.11g-only If we only have 802.11g-nodes we can use fast slot time. TCP data is then DIFS + 802.11 data + SIFS + 802.11 ACK = 28µs+20µs+57 4µs+6µs+10µs+20µs+1 4µs+6µs = 28µs + 254µs + 10µs + 30µs = 322µs TCP ACK packet is = DIFS + data + SIFS + 802.11 ACK = 28µs + 20µs + 3 4µs + 6µs + 10µs + 30µs = 28µs + 38µs + 10µs + 30µs = 106µs In total we have 428µs to transmit 1460 bytes of payload, which gives us a throughput of 27Mbit/s.

Information Networks p. 19 Maximum throughput 802.11g CTS-to-self The fast data frame will be protected by an 802.11b-compatible CTS consisting of preamble of 192µs and 14 byte of data transmitted at 11Mbit/s, i.e. same as 802.11b ACK packet, 203µs. Also fast slots are no longer allowed so DIFS = 50µs TCP data is then DIFS + CTS + SIFS + 802.11 data + SIFS + 802.11g ACK = 50µs + 203µs + 10µs + 254µs + 10µs + 30µs = 557µs TCP ACK packet is = DIFS + CTS + SIFS + data + SIFS + 802.11 ACK = 50µs + 203µs + 10µs + 38µs + 10µs + 30µs = 341µs In total we have 898µs to transmit 1460 bytes of payload, which gives us a throughput of 13Mbit/s.

Information Networks p. 20 Maximum throughput 802.11g RTS-CTS To guard against the hidden node problem we need a full RTS-CTS handshake. The RTS packet is slightly larger than the CTS since it contains 20 bytes of data, and takes 207µs. TCP data is now DIFS + RTS + SIFS + CTS + SIFS + 802.11 data + SIFS + 802.11g ACK = 50µs207µs + 10µs + 203µs + 10µs + 254µs + 10µs + 30µs = 774µs

Information Networks p. 21 Maximum throughput 802.11g RTS-CTS TCP ACK packet is = DIFS + RTS + SIFS + CTS + SIFS + data + SIFS + 802.11 ACK = 50µs+207µs+10µs+203µs+10µs+38µs+10µs+30µs = 558µs This is however longer time than it takes to send TCP ACK with 802.11b so we can use that instead resulting in 511µs In total we have 1285µs to transmit 1460 bytes of payload, which gives us a throughput of 9Mbit/s.