Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

Post on 13-Jan-2016

45 views 0 download

description

Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University. Wired Vs Wireless Media Access Both are on shared media. Then, what’s really the problem ?. The Channel Access Problem. Multiple nodes share a channel Pairwise communication desired - PowerPoint PPT Presentation

Transcript of Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

1

Wireless Medium Access Control

Romit Roy ChoudhuryWireless Networking LecturesDuke University

2

Wired Vs Wireless Media Access

Both are on shared media.Then, what’s really the problem ?

3

The Channel Access Problem

Multiple nodes share a channel

Pairwise communication desired Simultaneous communication not possible

MAC Protocols Suggests a scheme to schedule communication

• Maximize number of communications• Ensure fairness among all transmitters

AA CCBB

4

The Trivial Solution

Transmit and pray Plenty of collisions --> poor throughput at high

load

AA CCBB

collision

5

The Simple Fix

Transmit and pray Plenty of collisions --> poor throughput at high

load

Listen before you talk Carrier sense multiple access (CSMA) Defer transmission when signal on channel

AA CCBB

Don’ttransmit

Don’ttransmit

Can collisions still occur?Can collisions still occur?

6

CSMA collisions

Collisions can still occur:Propagation delay non-zero between transmitters

When collision:Entire packet transmission time wasted

spatial layout of nodes

note:Role of distance & propagation delay in determining collision probability

7

CSMA/CD (Collision Detection)

Keep listening to channel While transmitting

If (Transmitted_Signal != Sensed_Signal) Sender knows it’s a Collision ABORT

8

2 Observations on CSMA/CD

Transmitter can send/listen concurrently If (Sensed - received = null)? Then success

The signal is identical at Tx and Rx Non-dispersive

The TRANSMITTER can detect if and when collision occurs

The TRANSMITTER can detect if and when collision occurs

9

Unfortunately …

Both observations do not hold for wireless

Because …

10

Wireless Medium Access Control

A B

C D

Distance

Signalpower

SINR threhold

11

Wireless Media Disperse Energy

A B

C D

Distance

Signalpower

SINR threhold

A cannot send and listen in parallel

Signal not same at different locations

12

Collision Detection Difficult

Signal reception based on SINR Transmitter can only hear itself Cannot determine signal quality at

receiver

A CD

B

13

Calculating SINR

AB

C

CB

CtransmitC

B

AB

AAB

d

PI

d

PSoI

NNoiseIceInterferen

SoIterestSignalOfInSINR

transmit

)()(

)(

CB

Ctransmit

AB

A

AB

d

PN

d

P

SINR

transmit

D

14

A B

C D

Distance

Signalpower

SINR threhold

Red signal >> Blue signal

X

Red < Blue = collision

15

A B

C D

Distance

Signalpower

SINR threhold

Important: C has not heard A, but can interfere at receiver B

X

C is the hidden terminal to A

16

A B

C D

Distance

Signalpower

SINR threhold

Important: X has heard A, but should not defer transmission to Y

X

X is the exposed terminal to AY

17

Any Questions at this point?

18

So, how do we cope withHidden/Exposed Terminals?

19

A B

C D

Distance

Signalpower

SINR threhold

X

How to prevent C from trasmitting?

20

A Project Idea!

A B

C D

A node decides to intelligently choose a Carrier sensing threshold (T)

The node senses channel If signal > T, then node does not transmit If signal < T, then don’t transmit

Possible to guarantee no collisions?

21

A B

C D

Distance

Signalpower

SINR threhold

X

A Project Idea!

Sensitivity threshold

22

A B

C D

Distance

Signalpower

SINR threhold

Sensitivity threshold

X

T

A Project Idea!Will this solve the wireless MAC problem? Do not transmit in this region

23

Whatever the answer …

This is an example of a good class project

If you came up with the idea,Showed that it’s a new idea,

And evaluated it to demo how it performs

24

The Emergence of MACA, MACAW, & 802.11

Wireless MAC proved to be non-trivial

1992 - research by Karn (MACA) 1994 - research by Bhargavan (MACAW)

Led to IEEE 802.11 committee The standard was ratified in 1999

25

CTS = Clear To Send

RTS = Request To Send

IEEE 802.11

D

Y

S

M

K

RTS

CTS

X

26

IEEE 802.11

D

Y

S

X

M

Ksilenced

silenced

silenced

silencedData

ACK

27

802.11 Steps

All backlogged nodes choose a random number R = rand (0, CW_min)

Each node counts down R Continue carrier sensing while counting down Once carrier busy, freeze countdown

Whoever reaches ZERO transmits RTS Neighbors freeze countdown, decode RTS RTS contains (CTS + DATA + ACK) duration = T_comm Neighbors set NAV = T_comm

• Remains silent for NAV time

28

802.11 Steps

Receiver replies with CTS Also contains (DATA + ACK) duration. Neighbors update NAV again

Tx sends DATA, Rx acknowledges with ACK After ACK, everyone initiates remaining countdown Tx chooses new R = rand (0, CW_min)

If RTS or DATA collides (i.e., no CTS/ACK returns) Indicates collision RTS chooses new random no. R1 = rand (0, 2*CW_min) Note Exponential Backoff Ri = rand (0, 2^i * CW_min) Once successful transmission, reset to rand(0, CW_min)

29

But is that enough?

30

RTS/CTS

Does it solve hidden terminals ? Assuming carrier sensing zone =

communication zone

C

F

A B

E

D

CTS

RTS

E does not receive CTS successfully Can later initiate transmission to D.Hidden terminal problem remains.

E does not receive CTS successfully Can later initiate transmission to D.Hidden terminal problem remains.

31

Hidden Terminal Problem

How about increasing carrier sense range ?? E will defer on sensing carrier no

collision !!!

CB DData

A

E

CTS

RTSF

32

Hidden Terminal Problem

But what if barriers/obstructions ?? E doesn’t hear C Carrier sensing does not

help

CB DData

A

EF

CTS

RTS

33

Exposed Terminal

B should be able to transmit to A RTS prevents this

CA B

E

D

CTSRTS

34

Exposed Terminal

B should be able to transmit to A Carrier sensing makes the situation worse

CA B

E

D

CTSRTS

35

Thoughts !

802.11 does not solve HT/ET completely Only alleviates the problem through RTS/CTS and

recommends larger CS zone

Large CS zone aggravates exposed terminals Spatial reuse reduces A tradeoff RTS/CTS packets also consume bandwidth Moreover, backing off mechanism is also wasteful

The search for the best MAC protocol is still on. However, 802.11 is being optimized too.Thus, wireless MAC research still alive

36

Takes on 802.11

Role of RTS/CTS Useful? No? Is it a one-fit-all? Where does it not fit?

Is ACK necessary? MACA said no ACKs. Let TCP recover from losses

Should Carrier Sensing replace RTS/CTS?

New opportunities may not need RTS/CTS Infratructured wireless networks (EWLAN)

37

MACA-BI [GerlaUCLA]

RTS/CTS/ACK are control overhead Needed to reduce it

Rx predicts trasmission from the Tx Traffic estimation (???)

If Rx thinks Tx has pending packets for Rx Rx transmits RTR to Tx Tx replies with Data

Improves MACA with no RTS/ACK improvement but not too much

38

DBTMA [HaasCornell98]

A B X Y

RTS CTS Signal X

Rx Busy tone

A B X Y

CTS RTS Signal X

Tx Busy toneTx Busy tone

39

Implicit MACKnowledgment

APs typically backlogged with traffic Persistent traffic possibility of optimzation

We propose an implicit ACK optimization Piggyback the CTS with ACK for previous

dialog802.11

Implicit ACK

Gain

40

Hybrid Channel Access

The optimization timeline

T RRTS

CTS

Data

ACK

RTS

CTS

Data

ACK

T RRTS

CTS

Data

RTS

CTS +ACK

Data

T RRTS

CTS

Data

Poll +ACK

Data

RTS

CTS +ACK

Bac

kof

f

Bac

kof

fB

ack

off

Bac

kof

f

Poll +ACK

Data

Bac

kof

fB

ack

off

802.11802.11 Implicit ACKImplicit ACK Hybrid Channel AccessHybrid Channel Access

41

Seedex [KumarUIUC03]

Forget channel reservation and backoff Instead, let nodes pick sequence of time slots

Decides to probably transmit in some, else listen Transmit slots chosen using a random seed Publishes the seed to 2-hop neighbors

When PT slots arrive, nodes transmit with Probability “p” “p” chosen as a function of overlapping neighbors

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

42

Hot Research Topics

Power control increases spatial reuse Whisper in the room so that many people can talk

Rate control based on channel quality Expolit channel diversity

Utilize multiple channels to parallelize dialogs

Exploit spatial diversity Use directional antennas to interfere over smaller

region (next class)

… and many more topics

43

Questions ?

44

Announcements

Reviews: You are forgetting to appreciate the paper There is a reason why the paper was accepted

Please organize your papers/reviews Would be valuable later in career You never know what you will do after 5 years

Meet me with slides before you present Email for an appointment Don’t have to review if you are presenter

45

Announcements

Review Template: Problem definition? Why is it important? Validity of models and assumptions Solution Evaluation

Email review to TA (CC to me) Bring print out to class Name-date-subject in email subject Will post example reviews on webpage

Some of you still doing summaries.

46

Backup slides onIEEE 802.11

Read for more details

47

Today’s Discussions

IEEE 802.11 overview - some raw data Architecture PHY specifications – Spread Spectrum radios: FH & DS MAC specifications – DCF and PCF Synchronization, Power management, Roaming,

Scanning Security

Deliberations on 802.11 (DCF) MAC Hidden terminal & Exposed terminal issues Carrier sensing

Some other ideas & open challenges Could be interesting for the project

48

IEEE 802.11 – An overview

49

IEEE 802.11 in OSI Model

Wireless

50

802.11 Scope & Modules

MAC Sublayer

MAC LayerManagement

PLCP Sublayer

PMD Sublayer

PHY LayerManagement

LLC

MAC

PHY

To develop a MAC and PHY spec for wirelessconnectivity for fixed, portable and moving stationsin a local area

51

Applications

Single Hop Home networks Enterprise networks (e.g., offices, labs, etc.) Outdoor areas (e.g., cities, parks, etc.)

Multi-hops Adhoc network of small groups

(e.g.,aircrafts) Balloon networks (SpaceData Inc.) Mesh networks (e.g., routers on lamp-posts)

52

802.11 Architecture – Two modes

53

802.11 PHY Technologies

Two kinds of radios based on “Spread Spectrum” “Diffused Infrared”

Spread Spectrum radios based on Frequency hopping (FH) Direct sequence (DS)

Radio works in 2.4GHz ISM band --- license-free by FCC (USA), ETSI (Europe), and MKK (Japan) 1 Mbps and 2Mbps operation using FH 1, 2, 5.5, and 11Mbps operation using DSSS (FCC)

54

Why Spread Spectrum ?

C = B*log2(1+S/N) . . . [Shannon] To achieve the same channel capacity C

Large S/N, small B Small S/N, large B Increase S/N is inefficient due to the logarithmic relationship

power

B

signalnoise, interferences

power

signal

Bfrequency

e.g. B = 30 KHz e.g. B = 1.25 MHz

55

Spread Spectrum

Reduce effect of jamming Military scenarios

Reduce effect of other interferences More “secure”

Signal “merged” in noise and interference

Methods for spreading the bandwidth of the transmitted signal over a frequency band (spectrum)

which is wider than the minimum bandwidth required to transmit the signal.

56

Frequency Hopping SS (FHSS)

2.4GHz band divided into 75 1MHz subchannels

Sender and receive agree on a hopping pattern (pseudo random series). 22 hopping patterns defined

Different hopping sequences enable co-existence of multiple BSSs

Robust against narrow-band interferences

f f f f f f f f f f f

One possible pattern

57

FHSS due to [Lamarr1940]power

B

signalnoise, interferences

power

signal

Bfrequencyf f f f f f f f f f f

Invented by Hedy Lamarr (Hollywood film star) in 1940, at age of 27, with musician George Antheil

Simple radio design with FHSSData rates ~ 2 Mbps

58

Direct Sequence SS

Direct sequence (DS): most prevalent Signal is spread by a wide bandwidth

pseudorandom sequence (code sequence) Signals appear as wideband noise to

unintended receivers

Not for intra-cell multiple access Nodes in the same cell use same code

sequence

59

IEEE 802.11b DSSS

ISM unlicensed frequency band (2.4GHz)

Channel bandwidth: fhigh – flow = 22 MHz

1MHz guard band Direct sequence

spread spectrum in each channel

3 non-overlapping channels

Channel flow fhigh

1 2.401 2.423

2 2.404 2.428

3 2.411 2.433

4 2.416 2.438

5 2.421 2.443

6 2.426 2.448

7 2.431 2.453

8 2.436 2.458

9 2.441 2.463

10 2.446 2.468

11 2.451 2.473

60

Diffused Infrared

Wavelength range from 850 – 950 nm For indoor use only Line-of-sight and reflected transmission 1 – 2 Mbps

61

PHY Sublayers

Physical layer convergence protocol (PLCP) Provides common interface for MAC

• Offers carrier sense status & CCA (Clear channel assesment)

• Performs channel synchronization / training

Physical medium dependent sublayer (PMD) Functions based on underlying channel quality

and characteristics• E.g., Takes care of the wireless encoding

62

PLCP (802.11b)

longpreamble

192us

shortpreamble

96us(VoIP, video)

63

PLCP (802.11b)long

preamble192us

shortpreamble

96us(VoIP, video)

Note:

To send even one bit payloadreliably, you will have to form a packet with the PLCP preambleand the PLCP header.

This constraints protocol design

You cannot arbitrarily exchangecontrol messages.

What are the control messagesin IEEE 802.11 ?

64

IEEE 802.11 MAC

65

802.11 MAC (DCF)

CSMA/CA based protocol Listen before you talk CA = Collision avoidance (prevention is better than cure !!)

Robust for interference Explicit acknowledgment requested from receiverExplicit acknowledgment requested from receiver

• for unicast frames Only CSMA/CA for Broadcast frames

Optional RTS/CTS offers Virtual Carrier Sensing RTS/CTS includes duration of immediate dialog Addresses hidden terminal problems

66

802.11 MAC (DCF)

67

Physical Carrier Sense & Backoff

68

MAC Management Layer

Synchronization Finding and staying with a WLAN

• Uses TSF timers and beacons

Power Management Sleeping without missing any messages

• Periodic sleep, frame buffering, traffic indication map

Association and Reassociation Joining a network Roaming, moving from one AP to another Scanning

69

Synchronization

Timing Synchronization Function (TSF) Enables synchronous waking/sleeping Enables switching from DCF to PCF Enables frequency hopping in FHSS PHY

• Transmitter and receiver has identical dwell interval at each center frequency

Achieving TSF All stations maintain a local timer. AP periodically broadcasts beacons containing

timestamps, management info, roaming info, etc.• Not necessary to hear every beacon

Beacon synchronizes entire BSS• Applicable in infrastructure mode ONLY

Distributed TSF (for Independent BSS) more difficult

70

Power management Battery powered devices require power efficiency

LAN protocols assume idle nodes are always ON and thus ready to receive.

Idle-receive state key source of power wastage

Devices need to power off during idle periods Yet maintain an active session – tradeoff power Vs throughput

Achieving power conservation Allow idle stations to go to sleep periodically APs buffer packets for sleeping stations AP announces which stations have frames buffered

when all stations are awake – called Traffic Indication Map (TIM)

• TSF assures AP and Power Save stations are synchronized • TSF timer keeps running when stations are sleeping

Independent BSS also have Power Management Similar in concept, distributed approach

71

Roaming & Scanning

Stations switch (roam) to different AP When channel quality with current AP is poor

Scanning function used to find better AP Passive Scanning Listen for beacon from different Aps Active Scanning Exchange explicit beacons to determine

best AP

Station sends Reassociation Request to new AP If Reassociation Response successful Roaming

If AP accepts Reassociation Request AP indicates Reassociation to the Distribution System Distribution System information is updated Normally old AP is notified through Distribution System

72

MAC management frame

Beacon Timestamp, Beacon Interval, Capabilities, ESSID,

Supported Rates, parameters Traffic Indication Map

Probe ESSID, Capabilities, Supported Rates

Probe Response Timestamp, Beacon Interval, Capabilities, ESSID,

Supported Rates, parameters same for Beacon except for TIM

Association Request Capability, Listen Interval, ESSID, Supported Rates

Association Response Capability, Status Code, Station ID, Supported Rates

73

MAC Management Frame

Reassociation Request Capability, Listen Interval, ESSID, Supported Rates,

Current AP Address

Reassociation Response Capability, Status Code, Station ID, Supported Rates

Disassociation Reason code

Authentication Algorithm, Sequence, Status, Challenge Text

Deauthentication Reason

74

Security Range of attacks huge in wireless

Easy entry into the network Jamming, selfish behavior, spatial overhearing

Securing the network harder than wired networks Especially in distributed environments

WEP symmetric 40 or 128-bit encryption WPA: Wi-Fi protected access

Temporal key integrity protocol (TKIP) – better User authentication

IEEE 802.11i – Efforts toward higher security

75

PLCP

PLCP has two structures. All 802.11b systems have to support Long preamble. Short preamble option is provided to improve efficiency

when trasnmitting voice, VoIP, streaming video.

PLCP Frame format PLCP preamble

• SFD: start frame delimiter PLCP header

76

PLCP Header

8-bit signal or data rate (DR) indicates how fast data will be transmitted

8-bit service field reserved for future 16-bit length field indicating the length of

the ensuing MAC PDU (MAC sublayer’s Protocol Data Unit)

16-bit Cyclic Redundancy Code

77

Power management approach

Allow idle stations to go to sleep station’s power save mode stored in AP

APs buffer packets for sleeping stations. AP announces which stations have frames buffered Traffic Indication Map (TIM) sent with every Beacon

Power Saving stations wake up periodically listen for Beacons

TSF assures AP and Power Save stations are synchronized stations will wake up to hear a Beacon TSF timer keeps running when stations are sleeping synchronization allows extreme low power operation

Independent BSS also have Power Management similar in concept, distributed approach

78

Scanning

Scanning required for many functions. finding and joining a network finding a new AP while roaming initializing an Independent BSS (ad hoc) network

802.11 MAC uses a common mechanism for all PHY. single or multi channel passive or active scanning

Passive Scanning Find networks simply by listening for Beacons

Active Scanning On each channel Send a Probe, Wait for a Probe

Response Beacon or Probe Response contains information necessary

to join new network.

79

Active scanning example

80

Collision Detection

What is the aim of collision detection ?

It’s a transmitter’s job:

To determine if the packet was successfully received without explicitly asking the receiver

It’s a transmitter’s job:

To determine if the packet was successfully received without explicitly asking the receiver