Medium Access Control (MAC) Protocols

Similar documents
Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Wiereless LAN

Based on Computer Networking, 4 th Edition by Kurose and Ross

10. Wireless Networks

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSMA/CA. Information Networks p. 1

Lecture 7 Multiple Access Protocols and Wireless

The Wireless Network Road Trip

COMP 3331/9331: Computer Networks and Applications

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Data Center Networks, Link Layer Wireless (802.11)

Chapter 6: Wireless and Mobile Networks

Basic processes in IEEE networks

CSE 123A Computer Networks

EPL 657 Wireless Networks

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

... neither PCF nor CA used in practice

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Chapter 7 Low-Speed Wireless Local Area Networks

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

IEEE Technical Tutorial. Introduction. IEEE Architecture

Random Access Protocols

Ethernet, VLAN, Ethernet Carrier Grade

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

A Technical Tutorial on the IEEE Protocol

Internet Protocols Fall Outline

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Lecture 17: Wireless Networking"

Wireless and Mobile Networks

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Internet Packets. Forwarding Datagrams

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

IEEE Wireless LAN Standard. Updated: 5/10/2011

IEEE frame format

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

EETS 8316 Wireless Networks Fall 2013

Communication Systems Internetworking (Bridges & Co)

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

ECE/CS 372 introduction to computer networks. Lecture 13

Wireless LAN Concepts

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

RTT 60.5 msec receiver window size: 32 KB

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Ethernet. Ethernet. Network Devices

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Level 2 Routing: LAN Bridges and Switches

Multiple WiFi Clients on a Single Wireless Card

Adaptive DCF of MAC for VoIP services using IEEE networks

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

- Hubs vs. Switches vs. Routers -

Wireless Personal Area Networks (WPANs)

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Written examination in Computer Networks

Internet Control Protocols Reading: Chapter 3

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

Internet Protocols Fall Lectures 7-8 Andreas Terzis

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

IEEE Wireless LAN

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

RARP: Reverse Address Resolution Protocol

CS263: Wireless Communications and Sensor Networks

How To Analyze The Security On An Ipa Wireless Sensor Network

28 Networks and Communication Protocols

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

Fiber Distributed Data Interface

Subnetting,Supernetting, VLSM & CIDR

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

WIRELESS ETHERNET (IEEE )

ECE 428 Computer Networks and Security

Overview of Computer Networks

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo

Technical Support Information Belkin internal use only

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Algorithms for Interference Sensing in Optical CDMA Networks

Access Point Configuration

Final for ECE374 05/06/13 Solution!!

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Transcription:

Medium ccess Control (MC) Protocols MC Protocols: a taxonomy Three broad classes: Channel Partitioning divide channel into smaller pieces (time slots, frequency, code) allocate piece to node for exclusive use Random ccess channel not divided, allow collisions recover from collisions Taking turns Nodes take turns, but nodes with more to send can take longer turns

Channel Partitioning MC protocols: TDM TDM: time division multiple access access to channel in "rounds" each station gets fixed length slot (length = pkt trans time) in each round unused slots go idle example: 6-station LN,,3,4 have pkt, slots 2,5,6 idle Channel Partitioning MC protocols: FDM FDM: frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go idle example: 6-station LN,,3,4 have pkt, frequency bands 2,5,6 idle time frequency bands TDM (Time Division Multiplexing): channel divided into N time slots, one per user; inefficient with low duty cycle users and at light load. FDM (Frequency Division Multiplexing): frequency subdivided.

Random ccess Protocols When node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes collision, random access MC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) Examples of random access MC protocols: slotted LOH LOH CSM, CSM/CD, CSM/C MC ddresses and RP 32-bit IP : network-layer used to get datagram to destination IP subnet MC (or LN or physical or Ethernet) : used to get datagram from one interface to another physically-connected interface (same network) 48 bit MC (for most LNs) burned in the adapter ROM

LN ddresses and RP Each adapter on LN has unique LN -2F--76-09-D roadcast = FF-FF-FF-FF-FF-FF 7-65-F7-2-08-53 LN (wired or wireless) 58-23-D7-F-20-0 = adapter 0C-C4--6F-E3-98 LN ddress (more) MC allocation administered by IEEE manufacturer buys portion of MC space (to assure uniqueness) nalogy: (a) MC : like Social Security Number (b) IP : like postal MC flat portability can move LN card from one LN to another IP hierarchical NOT portable depends on IP subnet to which node is attached

RP: ddress Resolution Protocol Question: how to determine MC of knowing s IP? 237.96.7.23 7-65-F7-2-08-53 237.96.7.88 LN 237.96.7.78-2F--76-09-D 237.96.7.4 58-23-D7-F-20-0 0C-C4--6F-E3-98 Each IP node (Host, Router) on LN has RP table RP Table: IP/MC mappings for some LN nodes < IP ; MC ; TTL> TTL (Time To Live): time after which mapping will be forgotten (typically 20 min) RP protocol: Same LN (network) wants to send datagram to, and s MC not in s RP table. broadcasts RP query packet, containing 's IP Dest MC = FF- FF-FF-FF-FF-FF all machines on LN receive RP query receives RP packet, replies to with its ('s) MC frame sent to s MC (unicast) caches (saves) IP-to-MC pair in its RP table until information becomes old (times out) soft state: information that times out (goes away) unless refreshed RP is plug-and-play : nodes create their RP tables without intervention from net administrator

Routing to another LN walkthrough: send datagram from to via R assume know s IP Two RP tables in router R, one for each IP network (LN) In routing table at source Host, find router...0 R In RP table at source, find MC E6-E9-00-7--4, etc creates datagram with source, destination uses RP to get R s MC for...0 creates link-layer frame with R's MC as dest, frame contains -to- IP datagram s adapter sends frame R s adapter receives frame R removes IP datagram from Ethernet frame, sees its destined to R uses RP to get s MC R creates frame containing -to- IP datagram sends to R

Ethernet Frame Structure Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame Preamble: 7 bytes with pattern 0000 followed by one byte with pattern 000 used to synchronize receiver, sender clock rates Ethernet Frame Structure (more) ddresses: 6 bytes if adapter receives frame with matching destination, or with broadcast (eg RP packet), it passes data in frame to net-layer protocol otherwise, adapter discards frame Type: indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and ppletalk) CRC: checked at receiver, if error is detected, the frame is simply dropped

Ethernet uses CSM/CD No slots adapter doesn t transmit if it senses that some other adapter is transmitting, that is, carrier sense transmitting adapter aborts when it senses that another adapter is transmitting, that is, collision detection efore attempting a retransmission, adapter waits a random time, that is, random access Ethernet CSM/CD algorithm. daptor receives datagram from net layer & creates frame 2. If adapter senses channel idle, it starts to transmit frame. If it senses channel busy, waits until channel idle and then transmits 3. If adapter transmits entire frame without detecting another transmission, the adapter is done with frame! 4. If adapter detects another transmission while transmitting, aborts and sends jam signal 5. fter aborting, adapter enters exponential backoff: after the mth collision, adapter chooses a K at random from {0,,2,,2 m -}. dapter waits K 52 bit times and returns to Step 2

Self learning switch has a switch table entry in switch table: (MC ddress, Interface, Time Stamp) stale entries in table dropped (TTL can be 60 min) switch learns which hosts can be reached through which interfaces when frame received, switch learns location of sender: incoming LN segment records sender/location pair in switch table Filtering/Forwarding When switch receives a frame: index switch table using MC dest if entry found for destination then{ if dest on segment from which frame arrived then drop the frame else forward the frame on interface indicated forward on all but the interface } on which the frame arrived else flood

Switch example Suppose C sends frame to D switch 2 3 hub hub hub I E G interface 2 3 C D E F G H Switch receives frame from from C notes in bridge table that C is on interface because D is not in table, switch forwards frame into interfaces 2 and 3 frame received by D Switch example Suppose D replies back with frame to C. switch hub hub hub I E G C interface 2 3 C D E F G H Switch receives frame from from D notes in bridge table that D is on interface 2 because C is in table, switch forwards frame only to interface frame received by C

IEEE 802. Wireless LN 802.b 2.4-5 GHz unlicensed radio spectrum up to Mbps direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code widely deployed, using base stations 802.a 5-6 GHz range up to 54 Mbps 802.g 2.4-5 GHz range up to 54 Mbps ll use CSM/C for multiple access ll have basestation and ad-hoc network versions 802. LN architecture Internet wireless host communicates with base station base station = access point (P) SS P hub, switch or router asic Service Set (SS) (aka cell ) in infrastructure mode contains: P wireless hosts access point (P): base station SS 2 ad hoc mode: hosts only

802.: Channels, association 802.b: 2.4GHz-2.485GHz spectrum divided into channels at different frequencies P admin chooses frequency for P interference possible: channel can be same as that chosen by neighboring P! host: must associate with an P scans channels, listening for beacon frames containing P s name (SSID) and MC selects P to associate with may perform authentication [Chapter 8] will typically run DHCP to get IP in P s subnet IEEE 802.: multiple access avoid collisions: 2 + nodes transmitting at same time 802.: CSM - sense before transmitting don t collide with ongoing transmission by other node 802.: no collision detection! difficult to receive (sense collisions) when transmitting due to weak received signals (fading) can t sense all collisions in any case: hidden terminal, fading goal: avoid collisions: CSM/C(ollision)(voidance) C C s signal strength C s signal strength space

IEEE 802. MC Protocol: CSM/C 802. sender if sense channel idle for DIFS then transmit entire frame (no CD) 2 if sense channel busy then start random backoff time timer counts down while channel idle transmit when timer expires if no CK, increase random backoff interval, repeat 2 802. receiver - if frame received OK return CK after SIFS (CK needed due to hidden terminal problem) DIFS sender data CK receiver SIFS voiding collisions (more) idea: allow sender to reserve channel rather than random access of data frames: avoid collisions of long data frames sender first transmits small request-to-send (RTS) packets to S using CSM RTSs may still collide with each other (but they re short) S broadcasts clear-to-send CTS in response to RTS RTS heard by all nodes sender transmits data frame other stations defer transmissions void data frame collisions completely using small reservation packets!

Collision voidance: RTS-CTS exchange P RTS() RTS() reservation collision RTS() CTS() CTS() DT () defer time CK() CK() 802. frame: ing frame control 2 2 6 6 6 2 6 0-232 4 duration 2 3 seq control 4 payload CRC ddress : MC of wireless host or P to receive this frame ddress 2: MC of wireless host or P transmitting this frame ddress 3: MC of router interface to which P is attached ddress 3: used only in ad hoc mode

802. frame: ing H R router Internet P R MC addr P MC addr dest. source 802.3 frame P MC addr H MC addr R MC addr 2 3 802. frame 802. frame: more duration of reserved transmission time (RTS/CTS) frame seq # (for reliable RQ) frame control 2 2 6 6 6 2 6 0-232 4 duration 2 3 seq control 4 payload CRC Protocol version 2 2 4 Type Subtype To P From P More frag Power Retry mgt More data WEP Rsvd frame type (RTS, CTS, CK, data)