Professional Documents
Culture Documents
EEL 6591, Wireless Networks
EEL 6591, Wireless Networks
EEL 6591, Wireless Networks
Lecture 10
Wireless Ethernet
3/24/2010
Spring 2010
1
Overview
Protocol Architecture
MAC in wireless networks
CSMA
Hidden and Exposed Terminals
MACA
MACAW
IEEE 802.11
2
References
Wireless Communications and Networks, by W.
Stallings, chapter 14
P. Karn, “MACA-A new channel access method for
Packet Radio”, Amateur Radio 9th Computer
Networking Conference, Sept 1990
V. Bhargavan, A. Demers, S. Shenker and L. Zhang,
“MACAW: A media access protocol for wireless
LANs”, Proceedings of ACM SIGCOMM ’94.
3
4
5
Protocol Architecture
6
Protocol Architecture
7
Separation of LLC and MAC
The logic required to manage access to a
shared-access medium not found in
traditional layer 2 data link control
For the same LLC, several MAC options
may be provided
8
MAC Frame Format
MAC control
Contains Mac protocol information
Destination MAC address
Destination physical attachment point
Source MAC address
Source physical attachment point
CRC
Cyclic redundancy check
9
Logical Link Control
Characteristics of LLC not shared by other
control protocols:
Must support multiaccess, shared-medium
nature of the link
Relieved of some details of link access by
MAC layer
LLC Services
Unacknowledged connectionless service
No flow- and error-control mechanisms
Data delivery not guaranteed
Connection-mode service
Logical connection set up between two users
Flow- and error-control provided
Acknowledged connectionless service
Cross between previous two
Datagrams acknowledged
No prior logical setup
Medium Access Control in Wireless
Networks
Medium Access Control in WN
13
MAC protocols
14
Basic MAC mechanisms
Fixed Allocation
TDMA, FDMA – allocate a share of the available
bandwidth permanently to users.
not scalable; wasteful with idle users
Dynamic Allocation (with Reservations)
Difficult to do in a distributed setting.
Requires a lot of coordination
Synchronization between nodes is difficult.
15
Basic MAC mechanisms
16
Random Access MAC Methods
17
Some Key Concepts
A B C
Frames from A and C
collide at B.
19
Some Key Concepts
20
Model
Any two stations are either in-range or out-
of-range of one another
A station successfully receives a packet if
and only if there is only one active
transmitter within its range
Symmetric model: if a station A can hear a
station B, then B can hear A
21
CSMA- Carrier Sense Multiple Access
Every node senses the channel before initiating
a transmission
A station can transmit only if the medium is
idle; otherwise wait until current transmission
complete
Carrier sense is testing the signal strength at
the transmitter. However, collisions happens at
receiver not transmitter !
Used with the Exponential back-off scheme
22
Exponential back-off scheme
Backoff Time is a pseudorandom integer
uniformly distributed in [0, BO]
BOmin ≤ BO ≤ BOmax
The back-off (BO) parameter takes initially
the value BOmin
After an unsuccessful attempt,
BO = min( f×BO, BOmax)
A B C D
A is transmitting to B
C senses the channel – no idea A is
transmitting
C initiates transmission to D (or B)
Collision at B !
A B C D
B is transmitting to A
C could potentially transmit to D but does not:
C senses the channel and hears an ongoing
transmission
C is ‘exposed’ to B
Loss in throughput !
25
MACA: Multiple Access with Collision Avoidance
No carrier sensing !
Exchange of two short messages, of fixed size
RTS (Request to Send)
CTS (Clear to Send)
26
MACA: Multiple Access with Collision Avoidance
transmission
B responds with CTS also containing duration
of proposed communication
Upon CTS receipt, A begins transmission
27
MACA
28
MACA
RTS
C A CTS B D
DATA
time
If A does not receive CTS , it will time-out
30
MACAW – MACA for Wireless LANs
Design criteria:
The MAC protocol should yield high
network utilization
It should provide fair access to the media
These are in some sense contradicting
features
31
Reliability in MACAW
In MACA, no concept of reliability at the link layer.
MACA relies on a higher layer (TCP) to make error
recovery
In MACAW, an additional ACK is added to provide
link layer reliable data transmission:
RTS/CTS/DATA/ACK
if data is sent successfully, but ACK is not, when
RTS is retransmitted, the receiver returns ACK
(instead of CTS)
Sender backoff when no CTS or ACK received
Sender backoff when receives ACK
32
IEEE 802.11
The 802.11 standard provides MAC and PHY
functionality for wireless connectivity of fixed,
portable and moving stations moving at
pedestrian and vehicular speeds within a local
area.
The 802.11 standard takes into account the
following significant differences between
wireless and wired LANs:
Power Management
Security
Bandwidth
Addressing 33
IEEE 802.11 Physical layer
34
IEEE 802.11 Physical layer
Standards:
IEEE 802.11, 1997, 1 / 2 Mbps, 2.4 GHz, FHSS/DSSS,
range 20/100 m
IEEE 802.11b, 1999, 1,2,5.5,11 Mbps, 2.4 GHz,
DSSS, range 38/140 m
IEEE 802.11a, 1999, 6-54Mbps, 5 GHz, OFDM, range
35/120 m
IEEE 802.11g, 2003, 54 Mbps, 2.4 GHz,
DSSS/OFDM, range 38/140 m
IEEE 802.11y(a), 2008, 6-54 Mbps, 5 GHz, OFDM,
range -/5000 m
IEEE 802.11n, 2009, 7.2-150 Mbps, 2.4/5 GHz,
OFDM, range 70/250 m
35
IEEE 802.11 Architecture
STA=station 36
IEEE 802.11 Architecture
Basic Service Set (BSS) – smallest component
Has at least 2 stations (STA), competing for
medium access
May be isolated, or connected to a backbone
37
IEEE 802.11 Architecture
Independent BSS (IBSS)
An ad-hoc network
Extended Service Set (ESS)
Large coverage networks of arbitrary size and
complexity
Consists of two or more BSSs interconnected by
APs and a DS, such as Ethernet
Used for campus/corporate intranets, e.g. FAU
38
IEEE 802.11 MAC Layer
Primary operations
reliable data delivery
accessing the wireless medium
security
39
Association-Related Services
Association
Establishes initial association between station and AP
Reassociation
Enables transfer of association from one AP to another,
allowing station to move from one BSS to another
Disassociation
Association termination notice from station or AP
Access and Privacy Services
Authentication
Establishes identity of stations to each other
Deathentication
Invoked when existing authentication is
terminated
Privacy
Prevents message contents from being read by
unintended recipient
Reliable Data Delivery
42
Reliable Data Delivery
Four-frame exchange protocol (CSMA/CA)
source first sends request to send (RTS) frame
C knows B is listening
A RTS
B C
CTS to A. Will not attempt to
Data transmit to B.
ACK
45
IEEE 802.11 - MAC layer
Wireless medium access:
Distributed Coordination Function (DCF) mode
Fundamental, contention-based access method.
Implemented for use with both ad hoc and infrastructure
networks
Point Coordination Function (PCF) mode
Optional, contention-free access method usable only on
infrastructure networks.
centralized access protocol, requires one node to
function as a polling master. This node is called the
point coordinator (PC).
Both the DCF and PCF can operate concurrently
within the same BSS to provide alternative
contention and contention-free periods
46
The DCF Carrier Sensing
Virtual carrier sense implemented using a network
allocation vector (NAV).
The NAV at each node is set to indicate the
remaining time before the medium is expected to
become idle.
The NAV is updated based on duration information
contained in overheard messages.
Actual carrier sense combines the NAV state, the
node’s transmission status and the physical carrier
sense indication from the physical layer.
47
MAC logic
49
Basic Medium Access under the DCF
59
PCF medium access during CFP