Top Banner
MAC Layer Protocols for Wireless Networks
23

MAC Layer Protocols for Wireless Networks

Feb 05, 2016

Download

Documents

Devin

MAC Layer Protocols for Wireless Networks. What is MAC?. MAC stands for M edia A ccess C ontrol . A MAC layer protocol is the protocol that controls access to the physical transmission medium on a LAN. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: MAC Layer Protocols for Wireless Networks

MAC Layer Protocols for Wireless Networks

Page 2: MAC Layer Protocols for Wireless Networks

What is MAC?

MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access to the physical transmission medium on a LAN.

It tries to ensure that no two nodes are interfering with each other’s transmissions, and deals with the situation when they do.

Page 3: MAC Layer Protocols for Wireless Networks

CSMA/CD MAC

CSMA/CD architecture used in Ethernet is a common MAC layer standard.

It acts as an interface between the Logical Link Control sublayer and the network's Physical layer.

Page 4: MAC Layer Protocols for Wireless Networks
Page 5: MAC Layer Protocols for Wireless Networks

Normal Ethernet OperationNormal Ethernet Operation

A

B

D

Data

C

Address mismatchpacket discarded

Address mismatchpacket discarded

Address matchpacket processed

Send datato node D

Transmitted packet seenby all stations on the LAN

(broadcast medium)

Page 6: MAC Layer Protocols for Wireless Networks

Ethernet CollisionsEthernet Collisions

A

B C

D

CollisionData transmission for A

Data transmission for C

Page 7: MAC Layer Protocols for Wireless Networks

Ethernet Transmission FlowchartEthernet Transmission Flowchart transmit packet

assemble packet

deferring on?

starttransmission send jam signal

increment attempts

compute and waitbackoff time

done excessivecollision errors

donetransmit ok

transmissiondone

?

yes

no yes

yes

no

no

yes

collision detect?

too manyattempts ?

Page 8: MAC Layer Protocols for Wireless Networks

Interference / Collisions

Interference on node b(“Hidden terminal problem”)

a

b

c

a b

ab

c d

Interference on node b

a and b interfere and hear noise only

Packets which suffered collisions should be re-sent.

Ideally, we would want all packets to be sent collision-free, only once…

Page 9: MAC Layer Protocols for Wireless Networks

Contention-based protocols CSMA — Carrier Sense Multiple Access

Ethernet (CSMA/CD) is not enough for wireless (collision at receiver cannot detect at sender)

MACA Protocol

A B C

Hidden terminal: A is hidden from C’s CS

Page 10: MAC Layer Protocols for Wireless Networks

Hidden Terminal Problem

A and C want to send data to B1. A senses medium idle and sends data2. C senses medium idle and sends data3. Collision occurs at B

A B C

Data Data

Page 11: MAC Layer Protocols for Wireless Networks

Collision Avoidance w/ RTS/CTS

A and C want to send to B1. A sends RTS (Request To Send) to B2. B sends CTS (Clear To Send) to A

C “overhears” CTS from B3. C waits for duration of A’s transmission

A B C

1.RTS

2.CTS2.CTS

3.Data

Page 12: MAC Layer Protocols for Wireless Networks

Overview of MAC Protocols Contention-based protocols (contd.)

MACAW — improved over MACA RTS/CTS/DATA/ACK Fast error recovery at link layer

IEEE 802.11 Distributed Coordination Function (DCF) Largely based on MACAW Called CSMA/CA

Page 13: MAC Layer Protocols for Wireless Networks

802.11 DCF (Distributed Coordinate Function)

Station listens before transmission If medium is free for more than DIFS: transmits Otherwise, uses exponential backoff mechanism

Page 14: MAC Layer Protocols for Wireless Networks

Interframe space (IFS)

SIFS : used by ACK, CTS, poll response(short)

PIFS : used by PC (point coordinator) when issuing polls(point)

DIFS : used by ordinary asynchronous traffic(distributed)

Page 15: MAC Layer Protocols for Wireless Networks

IEEE 802.11 DCF

Distributed coordinate function: ad hoc mode Virtual and physical carrier sense (CS)

Network allocation vector (NAV), duration field Binary exponential backoff RTS/CTS/DATA/ACK for unicast packets Broadcast packets are directly sent after

CS

Page 16: MAC Layer Protocols for Wireless Networks

Virtual Carrier Sense

Timing relationship

Page 17: MAC Layer Protocols for Wireless Networks

Random Backoff

Pick a timeslot chosen uniformly in [0, CW]

Listen up to chosen slot Transmit if nobody else started transmitting Wait if somebody else started transmitting

Time

Page 18: MAC Layer Protocols for Wireless Networks

Example: A Successful Transmission

A and B happened to choose different slots Node A chooses slot 4, hears nothing, transmits Node B chooses slot 8, hears Node A, waits

Success: exactly one node in first non-vacant slot

Node A:

Node B:

Slot choice (slot #4)

Slot choice (slot #8)

Time

Page 19: MAC Layer Protocols for Wireless Networks

Example: A Collision A and B happened to choose slot 4

Both listen and hear nothing Both transmit simultaneously

Collision: ≥ 2 nodes in first non-vacant slot

Node A:

Node B:

Slot choice (slot #4)

Slot choice (slot #4)

Time

Page 20: MAC Layer Protocols for Wireless Networks

High Contention Causes Collisions in CSMA

Uniform distribution “fills up,” quickly

Unacceptable collision rate above ~15 transmitting sensors

Page 21: MAC Layer Protocols for Wireless Networks

Binary Exponential Backoff (BEB)

• Creating more slots for solving the collision problem

Page 22: MAC Layer Protocols for Wireless Networks

Problems with BEB

Takes time for every node to increase CW Especially if traffic is spatially-correlated and

bursty Waste backoff slots if collisions cause

CW to increase

BEB causes performance to suffer

Page 23: MAC Layer Protocols for Wireless Networks

Q&A