/
1 Wireless Medium Access Control (MAC) 1 Wireless Medium Access Control (MAC)

1 Wireless Medium Access Control (MAC) - PowerPoint Presentation

shoffer
shoffer . @shoffer
Follow
346 views
Uploaded On 2020-08-27

1 Wireless Medium Access Control (MAC) - PPT Presentation

Romit Roy Choudhury Wireless Networking Lectures University of Illinois at Urbana Champaign 2 Wired Vs Wireless Media Access Both are on shared media Then whats really the problem 3 The Channel Access Problem ID: 805293

power 802 cts signal 802 power signal cts rts mac channel stations data ack carrier wireless terminal collision management

Share:

Link:

Embed:

Download Presentation from below link

Download The PPT/PDF document "1 Wireless Medium Access Control (MAC)" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

1

Wireless Medium Access Control (MAC)

Romit

Roy Choudhury

Wireless Networking Lectures

University of Illinois at Urbana Champaign

Slide2

2

Wired Vs Wireless Media Access

Both are on shared media.

Then, what’s really the problem ?

Slide3

3

The Channel Access Problem

Multiple nodes share a channel

Pairwise communication desired

Simultaneous communication not possible

MAC Protocols

Suggests a scheme to schedule communicationMaximize number of communicationsEnsure fairness among all transmitters

A

C

B

Slide4

4

The Trivial Solution

Transmit and pray

Plenty of collisions --> poor throughput at high load

A

C

B

collision

Slide5

5

The Simple Fix

Transmit and pray

Plenty of collisions --> poor throughput at high load

Listen before you talk

Carrier sense multiple access (CSMA)

Defer transmission when signal on channel

A

C

B

Don’t

transmit

Can collisions still occur?

Slide6

6

Collisions in CSMA

(Carrier Sense Multiple Access)

Collisions can still occur:

Propagation delay non-zero between transmitters

When collision:

Entire packet transmission

time wasted

spatial layout of nodes

note:

Role of distance & propagation delay in determining collision probability

Slide7

7

CSMA/CD (Collision Detection)

Keep listening to channel

While transmitting

If (Transmitted_Signal != Sensed_Signal)

Sender knows it’s a Collision

ABORT

Slide8

8

2 Observations on CSMA/CD

Transmitter can send/listen concurrently

If (Transmitted - Sensed = null)? Then success

The signal is identical at Tx and Rx

Non-dispersive

The TRANSMITTER can detect if and

when collision occurs

Slide9

9

Unfortunately …

Both observations do not hold for wireless

Because …

Slide10

10

Wireless Medium Access Control

A

B

C

D

Distance

Signal

power

Slide11

11

Wireless Medium Access Control

A

B

C

D

Distance

Signal

power

Decoding

threshold

Sensing

threshold

Slide12

12

Wireless Media Disperse Energy

A

B

C

D

Distance

Signal

power

A cannot send and listen in parallel

Slide13

13

Collision Detection Difficult

Signal reception based on SINR

Transmitter can only hear itself

Cannot determine signal quality at receiver

A

C

D

B

Slide14

14

Calculating SINR

A

B

C

D

Slide15

15

A

B

C

D

Distance

Signal

power

Red signal >> Blue signal

X

Red

Blue = collision

 

Slide16

16

A

B

C

D

Distance

Signal

power

X

A’s signal at C is above sensing threshold,

hence, C does not transmit

No Collisions

Slide17

17

A

B

C

D

Distance

Signal

power

C cannot sense A, assumes channel is free, transmits and collides at B

X

C is the hidden terminal to A

Slide18

18

A

B

C

D

Distance

Signal

power

C cannot sense A, assumes channel is free, transmits and collides at B

X

C is the hidden terminal to A

Decrease sensing threshold

C will not transmit

 No collisions

Slide19

19Exposed terminal problem

Slide20

20

A

B

C

D

Distance

Signal

power

X

Exposed terminal problem

Slide21

21

A

B

C

D

Distance

Signal

power

X

Exposed terminal problem

Slide22

22

Any

Questions

at this point?

Slide23

23

So, how do we cope with

Hidden/Exposed Terminals?

Slide24

24

The Emergence of

MACA

,

MACAW

, &

802.11Wireless MAC proved to be non-trivial1992 - research by Karn (MACA)1994 - research by Bhargavan (MACAW)Led to IEEE 802.11 committeeThe standard was ratified in 1999

Slide25

25

CTS = Clear

To Send

RTS = Request

To Send

IEEE 802.11

D

Y

S

M

K

RTS

CTS

X

Slide26

26

IEEE 802.11

D

Y

S

X

M

K

silenced

silenced

silenced

silenced

Data

ACK

Slide27

27

IEEE 802.11

D

Y

S

X

M

K

silenced

silenced

silenced

silenced

Data

ACK

M

Slide28

28

802.11 Steps

All backlogged nodes choose a random number

R = rand (0, CW_min)

Each node counts down R

Continue carrier sensing while counting down

Once carrier busy, freeze countdownWhoever reaches ZERO transmits RTSNeighbors freeze countdown, decode RTSRTS contains (CTS + DATA + ACK) duration = T_commNeighbors set NAV = T_commRemains silent for NAV time

Slide29

29

802.11 Steps

Receiver replies with CTS

Also contains (DATA + ACK) duration.

Neighbors update NAV again

Tx sends DATA, Rx acknowledges with ACK

After ACK, everyone initiates remaining countdownTx chooses new R = rand (0, CW_min)If RTS or DATA collides (i.e., no CTS/ACK returns)Indicates collisionRTS chooses new random no. R1 = rand (0, 2*CW_min)Note Exponential Backoff

Ri = rand (0, 2^i * CW_min)Once successful transmission, reset to rand(0, CW_min)

Slide30

30

But is that enough?

Slide31

31

RTS/CTS

Does it solve hidden terminals ?

Assuming carrier sensing zone = communication zone

C

F

A

B

E

D

CTS

RTS

E does not receive CTS successfully

 Can later initiate transmission to D.

Hidden terminal problem remains.

CTS

Slide32

32

Hidden Terminal Problem

How about increasing carrier sense range ??

E will defer on sensing carrier

 no collision !!!

C

B

D

Data

A

E

CTS

RTS

F

Slide33

33

Hidden Terminal Problem

But what if barriers/obstructions ??

E doesn’t hear C

Carrier sensing does not help

C

B

D

Data

A

E

F

CTS

RTS

Slide34

34

Exposed Terminal

E should be able to transmit to F

Carrier sensing makes the situation worse

C

A

B

E

D

RTS

F

Slide35

35

Thoughts !

802.11 does not solve HT/ET completely

Only alleviates the problem through RTS/CTS and recommends larger CS zone

Large CS zone aggravates exposed terminals

Spatial reuse reduces

 A tradeoff

RTS/CTS packets also consume bandwidth

Moreover, backing off mechanism is also wasteful

The search for the best MAC protocol is still on. However, 802.11 is being optimized too.

Thus, wireless MAC research still alive

Slide36

36

Takes on 802.11

Role of RTS/CTS

Useful? No?

Is it a one-fit-all? Where does it not fit?

Is ACK necessary?

MACA said no ACKs. Let TCP recover from lossesShould Carrier Sensing replace RTS/CTS?New opportunities may not need RTS/CTSInfratructured wireless networks (EWLAN)

Slide37

Some other thoughts!

37

Slide38

TDMA (Time Division Multiple Access)CSMA is sense and share.Possible to not sense, but pre-scheduleTDMA in time, FDMA in frequencyUnderpinned by the graph coloring problem

38

Slide39

Many Other VariantsMany techniques combine “lego blocks”See next slides for a few samples

39

Slide40

40

MACA-BI

[GerlaUCLA]

RTS/CTS/ACK are control overhead

Needed to reduce it

Rx predicts trasmission from the Tx

Traffic estimation (???)If Rx thinks Tx has pending packets for RxRx transmits RTR to TxTx replies with DataImproves MACA with no RTS/ACKimprovement but not too much

Slide41

41

Implicit MACKnowledgment

APs typically backlogged with traffic

Persistent traffic

 possibility of optimzation

We propose an implicit ACK optimization

Piggyback the CTS with ACK for previous dialog

802.11

Implicit ACK

Gain

Slide42

42

Optimizations to 802.11

T

R

RTS

CTS

Data

ACK

RTS

CTS

Data

ACK

T

R

RTS

CTS

Data1

RTS

CTS +ACK1

Data2

T

R

RTS

CTS

Data1

Poll +ACK1

Data2

RTS

CTS +ACK2

Backoff

Backoff

Backoff

Backoff

Poll +ACK2

Data3

Backoff

Backoff

802.11

Implicit ACK

Hybrid Channel Access

Slide43

43

Seedex

[KumarUIUC03]

Forget channel reservation and backoff

Instead, let nodes pick sequence of time slots

Decides to probably transmit in some, else listen

Transmit slots chosen using a random seedPublishes the seed to 2-hop neighborsWhen PT slots arrive, nodes transmit withProbability “p”“p” chosen as a function of overlapping neighbors

Slide44

44

Hot Research Topics

Power control increases spatial reuse

Whisper in the room so that many people can talk

Rate control based on channel quality

Expolit channel diversity

Utilize multiple channels to parallelize dialogsExploit spatial diversityUse directional antennas to interfere over smaller region (next class) … and many more topics

Slide45

45

Questions ?

Slide46

46

Backup slides on

IEEE 802.11

Read for more details

Slide47

47

Today’s Discussions

IEEE 802.11 overview - some raw data

Architecture

PHY specifications – Spread Spectrum radios: FH & DS

MAC specifications – DCF and PCF

Synchronization, Power management, Roaming, ScanningSecurityDeliberations on 802.11 (DCF) MACHidden terminal & Exposed terminal issuesCarrier sensing

Some other ideas & open challengesCould be interesting for the project

Slide48

48

IEEE 802.11 – An overview

Slide49

49

IEEE 802.11 in OSI Model

Wireless

Slide50

50

802.11 Scope & Modules

MAC

Sublayer

MAC Layer

Management

PLCP Sublayer

PMD Sublayer

PHY Layer

Management

LLC

MAC

PHY

To develop a

MAC

and

PHY

spec for wireless

connectivity for fixed, portable and moving stations

in a local area

Slide51

51

Applications

Single Hop

Home networks

Enterprise networks

(e.g., offices, labs, etc.)

Outdoor areas (e.g., cities, parks, etc.)Multi-hopsAdhoc network of small groups (e.g.,aircrafts)Balloon networks (SpaceData Inc.)Mesh networks

(e.g., routers on lamp-posts)

Slide52

52

802.11 Architecture – Two modes

Slide53

53

802.11 PHY Technologies

Two kinds of radios based on

“Spread Spectrum”

“Diffused Infrared”

Spread Spectrum radios based on

Frequency hopping (FH)Direct sequence (DS)Radio works in 2.4GHz ISM band --- license-free by FCC (USA), ETSI (Europe), and MKK (Japan)1 Mbps and 2Mbps operation using FH1, 2, 5.5, and 11Mbps operation using DSSS (FCC)

Slide54

54

Why Spread Spectrum ?

C = B*log

2

(1+S/N) . . . [Shannon]

To achieve the same channel capacity C

Large S/N, small BSmall S/N, large BIncrease S/N is inefficient due to the logarithmic relationship

power

B

signal

noise, interferences

power

signal

B

frequency

e.g. B = 30 KHz

e.g. B = 1.25 MHz

Slide55

55

Spread Spectrum

Reduce effect of jamming

Military scenarios

Reduce effect of other interferences

More “secure”

Signal “merged” in noise and interference

Methods for spreading the bandwidth of the

transmitted signal over a frequency band (spectrum)

which is

wider than the minimum bandwidth required to transmit the signal.

Slide56

56

Frequency Hopping SS (FHSS)

2.4GHz band divided into 75 1MHz subchannels

Sender and receive agree on a hopping pattern (pseudo random series). 22 hopping patterns defined

Different hopping sequences enable co-existence of multiple BSSs

Robust against narrow-band interferences

f

f

f

f

f

f

f

f

f

f

f

One possible pattern

Slide57

57

FHSS due to [Lamarr1940]

power

B

signal

noise, interferences

power

signal

B

frequency

f

f

f

f

f

f

f

f

f

f

f

Invented by Hedy Lamarr (Hollywood film star) in 1940, at age of 27, with musician George Antheil

Simple radio design with FHSS

Data rates ~ 2 Mbps

Slide58

58

Direct Sequence SS

Direct sequence (DS):

most prevalent

Signal is spread by a wide bandwidth pseudorandom sequence (code sequence)

Signals appear as wideband noise to unintended receivers

Not for intra-cell multiple accessNodes in the same cell use same code sequence

Slide59

59

IEEE 802.11b DSSS

ISM unlicensed frequency band

(2.4GHz)

Channel bandwidth:

f

high – flow = 22 MHz1MHz guard bandDirect sequence spread spectrum in each channel3 non-overlapping channels

Channel

f

low

f

high

1

2.401

2.423

2

2.404

2.428

3

2.411

2.433

4

2.416

2.438

5

2.421

2.443

6

2.426

2.448

7

2.431

2.453

8

2.436

2.458

9

2.441

2.463

10

2.446

2.468

11

2.451

2.473

Slide60

60

Diffused Infrared

Wavelength range from 850 – 950 nm

For indoor use only

Line-of-sight and reflected transmission

1 – 2 Mbps

Slide61

61

PHY Sublayers

Physical layer convergence protocol (PLCP)

Provides common interface for MAC

Offers carrier sense status & CCA (Clear channel assesment)

Performs channel synchronization / training

Physical medium dependent sublayer (PMD)Functions based on underlying channel quality and characteristicsE.g., Takes care of the wireless encoding

Slide62

62

PLCP (802.11b)

long

preamble

192us

short

preamble

96us

(VoIP, video)

Slide63

63

PLCP (802.11b)

long

preamble

192us

short

preamble

96us

(VoIP, video)

Note:

To send

even one bit payload

reliably, you will have to form

a packet with the PLCP preamble

and the PLCP header.

This constraints protocol design

You cannot arbitrarily exchange

control messages.

What are the control messages

in IEEE 802.11 ?

Slide64

64

IEEE 802.11 MAC

Slide65

65

802.11 MAC (DCF)

CSMA/CA based protocol

Listen before you talk

CA = Collision avoidance

(prevention is better than cure !!)

Robust for interference Explicit acknowledgment requested from receiver

for unicast framesOnly CSMA/CA for Broadcast frames

Optional RTS/CTS offers Virtual Carrier Sensing

RTS/CTS includes duration of immediate dialogAddresses hidden terminal problems

Slide66

66

802.11 MAC (DCF)

Slide67

67

Physical Carrier Sense & Backoff

Slide68

68

MAC Management Layer

Synchronization

Finding and staying with a WLAN

Uses TSF timers and beacons

Power Management

Sleeping without missing any messages Periodic sleep, frame buffering, traffic indication mapAssociation and Reassociation

Joining a network Roaming, moving from one AP to another Scanning

Slide69

69

Synchronization

Timing Synchronization Function (TSF)

Enables synchronous waking/sleeping

Enables switching from DCF to PCF

Enables frequency hopping in FHSS PHY

Transmitter and receiver has identical dwell interval at each center frequencyAchieving TSFAll stations maintain a local timer. AP periodically broadcasts beacons containing timestamps, management info, roaming info, etc.Not necessary to hear every beacon

Beacon synchronizes entire BSSApplicable in infrastructure mode ONLYDistributed TSF (for Independent BSS) more difficult

Slide70

70

Power management

Battery powered devices require power efficiency

LAN protocols assume idle nodes are always ON and thus ready to receive.

Idle-receive state key source of power wastage

Devices need to power off during idle periods

Yet maintain an active session – tradeoff power Vs throughputAchieving power conservationAllow idle stations to go to sleep periodicallyAPs buffer packets for sleeping stations

AP announces which stations have frames buffered when all stations are awake – called Traffic Indication Map (TIM)

TSF assures AP and Power Save stations are synchronized TSF timer keeps running when stations are sleeping

Independent BSS also have Power Management Similar in concept, distributed approach

Slide71

71

Roaming & Scanning

Stations switch (roam) to different AP

When channel quality with current AP is poor

Scanning function used to find better AP

Passive Scanning

 Listen for beacon from different ApsActive Scanning  Exchange explicit beacons to determine best APStation sends Reassociation Request to new AP If Reassociation Response successful

 Roaming If AP accepts Reassociation Request

AP indicates Reassociation to the Distribution System Distribution System information is updated Normally old AP is notified through Distribution System

Slide72

72

MAC management frame

Beacon

Timestamp, Beacon Interval, Capabilities, ESSID, Supported Rates, parameters

Traffic Indication Map

Probe

ESSID, Capabilities, Supported Rates Probe Response Timestamp, Beacon Interval, Capabilities, ESSID, Supported Rates, parameters same for Beacon except for TIM Association Request

Capability, Listen Interval, ESSID, Supported Rates Association Response

Capability, Status Code, Station ID, Supported Rates

Slide73

73

MAC Management Frame

Reassociation Request

Capability, Listen Interval, ESSID, Supported Rates, Current AP Address

Reassociation Response

Capability, Status Code, Station ID, Supported Rates Disassociation Reason code Authentication Algorithm, Sequence, Status, Challenge Text

Deauthentication Reason

Slide74

74

Security

Range of attacks huge in wireless

Easy entry into the network

Jamming, selfish behavior, spatial overhearing

Securing the network harder than wired networks

Especially in distributed environmentsWEP  symmetric 40 or 128-bit encryptionWPA: Wi-Fi protected accessTemporal key integrity protocol (TKIP) – better

User authenticationIEEE 802.11i – Efforts toward higher security

Slide75

75

PLCP

PLCP has two structures.

All 802.11b systems have to support Long preamble.

Short preamble option is provided to improve efficiency when trasnmitting voice, VoIP, streaming video.

PLCP Frame format

PLCP preambleSFD: start frame delimiterPLCP header

Slide76

76

PLCP Header

8-bit signal or data rate (DR) indicates how fast data will be transmitted

8-bit service field reserved for future

16-bit length field indicating the length of the ensuing MAC PDU (MAC sublayer’s Protocol Data Unit)

16-bit Cyclic Redundancy Code

Slide77

77

Power management approach

Allow idle stations to go to sleep

station’s power save mode stored in AP

APs buffer packets for sleeping stations.

AP announces which stations have frames buffered

Traffic Indication Map (TIM) sent with every Beacon Power Saving stations wake up periodically listen for Beacons TSF assures AP and Power Save stations are synchronized stations will wake up to hear a Beacon TSF timer keeps running when stations are sleeping synchronization allows extreme low power operation

Independent BSS also have Power Management similar in concept, distributed approach

Slide78

78

Scanning

Scanning required for many functions.

finding and joining a network

finding a new AP while roaming

initializing an Independent BSS (ad hoc) network

802.11 MAC uses a common mechanism for all PHY. single or multi channel passive or active scanning Passive Scanning Find networks simply by listening for Beacons Active Scanning On each channel Send a Probe, Wait for a Probe Response

Beacon or Probe Response contains information necessary to join new network.

Slide79

79

Active scanning example

Slide80

80

Collision Detection

What is the aim of collision detection ?

It’s a transmitter’s job:

To determine if the packet was

successfully received without

explicitly asking the receiver