Final Report. Pavan Pant U Thomas Castelli U

Similar documents
CSMA/CA. Information Networks p. 1

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

... neither PCF nor CA used in practice

Wiereless LAN

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Chapter 7 Low-Speed Wireless Local Area Networks

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Wireless LAN Concepts

Adaptive DCF of MAC for VoIP services using IEEE networks

Performance Evaluation of Wired and Wireless Local Area Networks

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Performance Analysis of the IEEE Wireless LAN Standard 1

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Random Access Protocols

An Overview of Wireless LAN Standards IEEE and IEEE e

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Introduction to Ethernet

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

ECE 333: Introduction to Communication Networks Fall 2002

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Lecture 17: Wireless Networking"

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

10. Wireless Networks

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

WIRELESS ETHERNET (IEEE )

IEEE Technical Tutorial. Introduction. IEEE Architecture

Wireless LAN Services for Hot-Spot

ECE/CS 372 introduction to computer networks. Lecture 13

How To Determine The Capacity Of An B Network

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

Lecture 7 Multiple Access Protocols and Wireless

MAC Algorithms in Wireless Networks

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Real-Time (Paradigms) (51)

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

ECE 428 Computer Networks and Security

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

EPL 657 Wireless Networks

Basic processes in IEEE networks

A Technical Tutorial on the IEEE Protocol

Selfish MAC Layer Misbehavior in Wireless Networks

TCP in Wireless Networks

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

IEEE Wireless LAN Standard. Updated: 5/10/2011

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

How To Make A Multi-User Communication Efficient

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Tutorial.

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

Modeling and Simulation of Quality of Service in VoIP Wireless LAN

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

Controlled Random Access Methods

Algorithms for Interference Sensing in Optical CDMA Networks

MDA: An Efficient Directional MAC scheme for Wireless Ad Hoc Networks 1

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)

SSPC and Data Transfer

How To Analyze The Security On An Ipa Wireless Sensor Network

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

Ethernet. Ethernet. Network Devices

Railway Freight Dispatching Telephone System Based on VoIP in Wireless Networks

CS263: Wireless Communications and Sensor Networks

OSI Reference Model: An Overview

Level 2 Routing: LAN Bridges and Switches

IEEE Ad Hoc Networks: Performance Measurements

Mobile Ad Hoc Networks

Central Manager: A Solution to Avoid Denial of Service Attacks for Wireless LANs

Solving the Performance Anomaly Problem Through Packet Aggregation

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Horizon: Balancing TCP over multiple paths in wireless mesh networks

EETS 8316 Wireless Networks Fall 2013

The Wireless Network Road Trip

A Neighborhood Awareness Method for Handoff Assistance in Wireless Networks

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Industrial Networks & Databases

RTT 60.5 msec receiver window size: 32 KB

Video Transmission over Wireless LAN. Hang Liu

Introduction to Optical Networks

THE development of media access control (MAC) protocols

Wireless Personal Area Networks (WPANs)

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

IEEE WLAN (802.11) ...Copyright. Renato Lo Cigno

Transcription:

Simulation of a Wireless Network Using The 802.11 MAC Protocol Final Report Pavan Pant U85160073 Thomas Castelli U18104565

I. Introduction What are Wireless Local Area Networks (WLANs), and more importantly, how do they work? Before delving into the mundane technical jargon that is usually associated with wireless networks, we will attempt to provide a more simplistic definition. WLANs are Local Area Networks (LANs) that do not use traditional cable or wired systems. Instead, they use Radio Frequency and Infrared (IR) to connect computers and peripherals over a network. This project was part of an independent study and simulates an 802.11 wireless network using MATLAB. The purpose of this document is to provide readers an idea of how we approached certain problems and implemented the 802.11 MAC protocol. Additionally, this document contains an explanation of the rationale behind some of our design choices and some interesting data that was extracted from the simulation. Some of the key terms that will be used throughout the paper and their definitions are as follows: 1) RTS: When a node has a data packet to transmit, it first broadcasts a small packet called a Request-To-Send (RTS) packet. 2) CTS: When the intended recipient on the WLAN receives an RTS packet, it broadcasts a small Clear-To-Send (CTS) packet. 3) ACK: Acknowledgement packet sent from the receiver to the sender upon successful completion of the data exchange. 4) CSMA/CA: Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a protocol in which (a) a carrier sensing scheme is used, (b) a data station that intends to transmit sends a jam signal, (c) after waiting a sufficient time for all stations to receive the jam signal, the data station transmits a frame, and (d) while transmitting, if the data station detects a jam signal from another station, it stops transmitting for a random time and tries again. II. Background and Motivation The main motivation for this project is to improve upon the simulation already authored by BU students Keyong Li and Mohammad Sherzai as their final project for this 2

course during the fall semester of 2001. Li and Sherzai discuss some of the problems with the 802.11 protocols and some possible solutions to these problems (such as RTS/CTS and back-off algorithms to deal with hidden and deaf nodes). However, the MATLAB simulation written by Li and Sherzai does not include any implementation of RTS/CTS, or back off, and makes a number of assumptions about the operating environment of the WLAN. Our primary intent was to relax some of the assumptions made by Li and Sherzai, and to add an implementation of RTS/CTS and back off to their simulation of an 802.11 wireless network. Our current simulator is slightly more comprehensive, considering we have implemented a Collision Avoidance system (CSMA/CA). The idea was to add depth to Li and Sherzai s existing research and we have successfully attained that goal. We also received a considerable amount of guidance from Professor Starobinski, who provided us with a paper on the deaf node problem in WLANs. The paper resulted from joint research efforts between Professors Starobinski, Carruthers, and Ray. It is hoped that our work will help to guide their research and provide a direction for improvements to the simulator. III. Approach We decided to tackle some of the problems with WLANs through a combination of literary research and insights from Li and Sherzai s MATLAB code. Li and Sherzai had implemented CSMA without the Collision Avoidance scheme. We improved the original simulation by including RTS/CTS exchanges, which is part of the CSMA/CA protocol. Using this methodology, we hoped to increase the number of successful transmissions and decrease the number of collisions within the WLAN. This particular aspect of the simulation is demonstrated in the Analysis section of this paper. The graph clearly shows that our simulation improves performance compared to the original simulation. 3

Additionally, the simulation makes sure that once an RTS/CTS handshake is completed, all other nodes not included in the data exchange remain silent. This is done to prevent nodes from getting into a continuous cycle of RTS/CTS exchanges. IV. Implementation The 802.11 wireless network is simulated in MATLAB using CSMA/CA as the MAC protocol. Li and Sherzai s original code was used as a basis for improvement. Our version of the simulation includes: Display of RTS/CTS packets Number of DATA and ACK packet collisions, using RTS/CTS Number of mobile communication stations Transmission range of each station Mobility of stations Average transmission time (DATA packet size). In order to simplify our task, we have made certain assumptions about the network environment. Our assumptions are as follows: Distributed Control Function is in use Propagation delay is assumed to be zero According to the IEEE paper on the 802.11 protocol, a coordination function determines when a station is permitted to transmit and may be able to receive data through the wireless channel. A Distributed Coordination Function (DCF) is any member of a class of coordination functions where the same logic is active in every station whenever the network is in operation. DCF is a basic medium access protocol that allows for automatic sharing between compatible Physical Layers, with the help of CSMA/CA and a random back off interval following any busy medium condition. All directed traffic uses immediate positive acknowledgment (ACK frame) where the sender schedules retransmission if no ACK has been received. CSMA/CA is used to avoid collisions between multiple stations (network nodes) accessing the medium at the point where collisions are most likely -- right after the 4

medium becomes idle following a busy condition. This is also the reason why random back off time intervals have been implemented. The CSMA/CA protocol specifies that for a node to transmit, it will first sense the medium around it to determine whether another node is transmitting. If the node in question finds that the medium is free, then that node will begin transmission. The CSMA/CA algorithm also mandates a delay between contiguous frame sequences. A transmitting node will make sure that the medium is idle for this required duration of time. Nodes will each select a random back-off interval to initialize a counter, and will decrement this counter while the medium remains idle. Random back off has been implemented in our simulation. The time interval between frames is known as the Inter Frame Space (IFS). Once a node has determined that the medium is idle, two IFSs (Distributed IFS and Short IFS) are defined, to provide delays between sending and receiving RTS, CTS, DATA and ACK packets. The way CSMA/CA works is illustrated through the diagram shown below: When a node needs to transmit a DATA packet, and it detects that the medium is idle, it will first broadcast a small packet called a Request To Send (RTS) packet. The RTS packet contains relevant information for the destination node. The receiving node, if it is within range, will wait SIFS units of time, and then respond to the sender with another small packet 5

called Clear To Send (CTS). The CTS packet indicates that the intended recipient of the data is both within range, and ready to receive data. Upon receipt of the CTS packet, the sender waits another SIFS units of time before sending the DATA packet. Once the receiver has heard the DATA successfully, it will wait SIFS units of time, and then send an Acknowledgement (ACK) packet back to the sender. If the sender does not receive an ACK before a set timeout interval, it will try again by sending out another RTS packet. If a node is within range of the sender, hears an RTS packet, and is not the intended recipient, it will refrain from sending DATA or RTS packets for a random period of time, known as the back-off interval. This is done to prevent packet collisions within the network. In our simulation, the RTS/CTS exchange is illustrated by the use of concentric circles. Red concentric circles represent an RTS packet, whereas green concentric circles represent a CTS packet. Following this initial exchange of RTS/CTS packets between the sender and the recipient, the sender transmits a DATA packet, which is represented in our simulation by a red line. Once the DATA arrives, the receiver sends an ACK packet back to the sender. A green line in the simulation represents an ACK packet. The graphics were set-up using pointers/handles to graphical objects. Initially these objects are all circles. E.g: h2 (i) = plot (exp (j*ph)*(1+r), 'EraseMode', 'xor'); The MATLAB file show1.m changes the properties of these objects to show whether a packet is in range, etc. They get changed to lines to show packet transmission. V. Analysis We have found that the inclusion of RTS/CTS handshaking greatly improves the performance of our simulated WLAN. We collected data on the number of successful transmissions and the number of collisions, while varying the number of users on the wireless network using our simulation. Following this we collected the same data using Li and Sherzai s implementation. The performance analysis clearly shows an improvement using CSMA/CA as the protocol. 6

VI. Summary/Conclusions Our conclusions based on the improved simulation are as follows: Fewer packet collisions and improved collision avoidance. More nodes lead to deadlocks where nodes keep exchanging RTS/CTS packets, and no data is exchanged. All major functionalities are working effectively at this point. There are a few cases of situations where the nodes keep exchanging RTS/CTS packets, and we have yet to explain this situation. One possibility is that of the blocked node, which Professor Starobinski and Ray are currently researching. This concept was introduced to us through Aspian Gazner and Andrew McKnight s presentation. 7

It is our hope that this simulation model will serve as a tool for analysis of wireless networks in the future, or as a basis for future simulators. VII References and Acknowledgements 1. ANSI/IEEE Standard 802.11. Piscataway, NJ: LAN MAN society, IEEE Computer Society. Copyright 1999. Available online at http://standards.ieee.org/reading/ieee/std/lanman/802.11-1999.pdf. 2. Carruthers, Jeffrey B., Starobinski, David and Ray, Saikat. The Deaf Node Problem in Ad Hoc Wireless LANs. Not yet published. Contact Professor Starobinski, e- mail staro@bu.edu. 3. Li, Keyong and Sherzai, Mohammed. Wireless MAC 802.11. Unpublished work, final paper for SC 546, Fall 2001. Available online at http://courseinfo.bu.edu/courses/02fallengsc546_a1/coursedocuments/a349b830b c631d6136de00600832de87/paper/finalpaper.doc. We would like to thank Professor Starobinski and Keyong Li for their insights and constructive criticism, without which this project could not have been completed. 8