Chapter 6: Multiple Radio Access
Transcript of Chapter 6: Multiple Radio Access
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 1
Chapter 6
Multiple Radio Access
Adapted from class notes by
Prof. Leszek T. Lilien, CS, Western Michigan University
and
Prof. Dharma P. Agrawal & Qing-An Zeng, University of Cincinnati
Most slides based on publisher’s slides for 1st and 2nd edition of: Introduction to Wireless and Mobile Systems by Agrawal & Zeng
© 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved.
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 3
Multiple access (Medium Access Control, MAC)
Multiple
Access Medium
MS 4
MS 3
MS 2
MS 1…
MS n
(Link, Channel)
p. 126 (頁142) Fig. 6.1
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 6
Introduction (Cont’d)
Multiple access issues
If more than one node transmit at a time on the control channel to BS, a collision occurs
How to determine which node can transmit to BS?
Multiple access protocols
Solving multiple access issues
Different types:
Contention protocols resolve a collision after it occurs. These protocols execute a collision resolution protocol after each collision. (Chapter 6)
Collision-free protocols (e.g., a bit-map protocol and binary countdown) ensure that a collision can never occur. (Chapter 7)
(Collision)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 7
Medium-
sharing
Techniques
Static
Channelization
Dynamic
Medium Access
Control
Scheduled
Random
Access
eg., FDM, TDM (Ch.7)
eg., Ethernet, WiFi (Ch. 6)
(Broadcast channels)
(Multiaccess channels)
Random access channels
Medium (Channel) Sharing Techniques
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 9
Recall ISO Open Systems Interconnection Reference Model for
networks
Communication subnetwork = 3 lowest layers of OSI
Network layer (NET)
Data link layer (DLL)
Physical layer (PHY)
6.2. Multiple (Radio) Access Protocols = MAC
Sublayer Protocols
© 2016 by Leszek T. Lilien
DLL
NET
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 10
Why do we need MAC?
Contention and Collision Avoidance ! ieee802.11WirelessNet
Prof. Tseng, NCTU
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 11
Why Do We Need MAC?
Fairness !!! ieee802.11WirelessNet
Prof. Tseng, NCTU
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 15
applicationapplication
presentation
session
transport
network
data link
physical
7
6
5
4
3
2
1
data
data
data
data
data
data
data
AH
AHPH
AHPHSH
AHPHSHTH
AHPHSHTHNH
AHPHSHTHNH
bit streams
DT
H: header
T: trail
Each may be empty.
DH
Review on Computer Networks
Ch.4 The Medium Access Control Sublayer
Session
Transport
Network
Physical
Presentation
Application
MAC
OSI Reference Model
LLC
Broadcast channel
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 16
L3
contr
ol
contr
ol
contr
ol
contr
ol
Logical
Channels
Transport
Channels
C-plane signalling U-plane information
PHY
L2/MAC
L1
RLC
DCNtGC
L2/RLC
MAC
RLC
RLCRLC
RLC
RLCRLC
RLC
Duplication avoidance
UuS boundary
BMCL2/BMC
control
PDCPPDCP L2/PDCP
DCNtGC
Radio
Bearers
RRC
WCDMA
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 20
Hawaii
Honolulu
http://a.abcnews.com/images/Travel/GTY_hawaii_kab_140620_12x5_1600.jpg
http://www.punjabigraphics.com/images/155/Aloha-Colorful-Flowers-Picture.jpg
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 21
Honolulu
https://zh.wikipedia.org/wiki/檀香山#/media/File:Diamond_Head_Honolulu.jpg
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 22
Hawaii
Taiwan
https://www.google.com/maps/place
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 23https://www.technologyuk.net/telecommunications/networks/images/aloha.gif
檀香山(Honolulu)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 24https://www.technologyuk.net/telecommunications/networks/images/aloha.gif
The ALOHA packet radio system
檀香山(Honolulu)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 25
6.3.1. ALOHA (a.k.a. Pure ALOHA)
Developed in the 1970s for a packet radio network by University
of Hawaii To interconnect islands’ campuses / Single-hop network
Principles:
Sender S may transmit a packet at any time (hoping no collision will
occur)
S finds out whether transmission was successful or experienced
a collision by listening for an ACK broadcast from the
destination station Successful if an ACK arrives within a time-out period T
If no ACK within T, S assumes that there was a collision
=> packet was lost after colliding with packet of another station
If there was a collision, S retransmits after some random time
Analogy: 2 people entering a doorway simultaneously Collision can occur
(Modified by LTL)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 26
ALOHA (in the 1970s)
In pure ALOHA, frames are transmitted at
completely arbitrary times.Stations, Nodes, Terminals
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 27
In pure ALOHA, frames are transmitted
at completely arbitrary times
CollisionCollisionTime
Stations, Nodes, Terminals
Pure ALOHA (in the 1970s)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 28
6.3.1. ALOHA – cont.
Collision in Pure ALOHA (can last up to 2T)
1 2 3 3 2Time
Collision
Retransmission Retransmission
MS 1 packetWait for a random time
MS 2 packet
MS 3 packet
t - T t t + TT
Recall ALOHA principles:
Sender S may transmit a packet at any time
S waits for an ACK broadcast from the destination station
If there was a collision, S retransmits after some random time
Example: Packet 2 from MS2 & Packet 3 from MS3 collide
MS3 retransmits Packet 3 pretty soon (random wait)
MS2 retransmits Packet 2 much later (random wait)
Note: Collision can block channel for period up to 2T (Vulnerable period)
(Modified by LTL)
p. 129 (頁145) Fig. 6.4
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 29
Pure ALOHA: Performance
Vulnerable period (2t) for the shaded frame.
2t
TimeFrame
Frame
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 30
Throughput of ALOHA (cont.)
• T – packet length (duration)
• Successful Probability in time 2T:
where G = gT is normalized offerred traffic load for the channel
G
th eGTPGS 2
0 2 • Throughput:
184.02
1max
eS
• Maximum throughput for ALOHA (G=1/2)
(Modified by LTL)
.!0
)2()2( 22
0
0
GgT eegT
TP
Ps = P(no collision)= P(no transmission in two packets time)= P(no transmission in 2T)
=
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 31
Throughput for ALOHA
Slotted Aloha
Aloha
0.368
0.184
Traffic load G
Thro
ughput
Sth
(Modified by LTL)
G86420
0.5
0.4
0.3
0.2
0.1
0
Max. throughputfor ALOHASth = 0.184 at G = ½
p. 131 (頁147) Fig. 6.6
0.184
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 32
Improvements over Pure ALOHA:
Time is slotted
Slot length = packet length (duration) = T
Packet transmission can start only at the beginning of
a slot
This reduces collision duration
Pure ALOHA: If Packet 1 is almost finished when it
collides with just-starting Packet 2, collision can lasts for
nearly T+T = 2T
Slotted ALOHA: 2 Packets can collide only when both are
just starting => collision can last at most T
(Modified by LTL)
6.3.2. Slotted ALOHA
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 33
6.3.2. Slotted ALOHA – cont.
Collision in Slotted ALOHA (can last max. T)
1 2&3 2Time
Collision
Retransmission Retransmission
3
Slots
MS 1 packet
MSs 2 & 3 packets Wait for a random time
Example: Packet 2 from MS2 & Packet 3 from MS3 collide
MS2 retransmits Packet 2 pretty soon (random wait)
MS3 retransmits Packet 3 much later (random wait)
Note: Shows again that collision can block channel for period T
(Modified by LTL)
p. 130 (頁146) Fig. 6.5
2 & 3
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 34
Slotted ALOHA: PerformanceVulnerable period (t) for the shaded frame.
t
Deferred to next slot
Time
Frame
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 35
Throughput of Slotted ALOHA
. ,0 gTGeTP G
• Probability of no collision
G
oth eGTPGS
• Throughput:
368.01
max e
S
• Maximum throughput for slotted ALOHA (G = 1)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 36
6.1. Introduction
© 2016 by Leszek T. Lilien
Recall
Large # of traffic
channels on each BS Because traffic channels used by
1 MS exclusively for call duration
Collision-free protocols (Ch.7)
Small # of control
channels (CC) on each BS Because control channels
shared by many MSs
for short periods
Too expensive/inefficient to assign control channel for call duration
Contention protocols (Ch.6)
MSs compete for these few shared control channels For call setup, etc.
BSMS1
p. 19 (頁19) Fig. 1.20
MS2
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 37
Classification of
Multiple Access
Protocols
Random access protocols – upon collision, retrans-mit after a ran-dom delay
Collision resolution protocols - upon collision, retransmit according to a more sophisti-cated method
Multiple-access protocols
Contention-based Collision-free
Random access Collision resolution
FDMA
TDMA
CDMA
Token Bus
DQDB
etc.
ALOHA
CSMA
BTMA,
ISMA
etc.
TREE
WINDOW
etc.
DQDB: Distributed Queue Dual Bus BTMA: Busy Tone Multiple Access
ISMA: Idle Signal Multiple Access
ALOHA and CSMA protocols will be discussed in this section.
p. 127 (頁143) Fig. 6.3
(Chapter 6) (Chapter 7)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 38
6.3. Contention-Based Protocols
Major categories of contention-based protocols
1) ALOHA (a.k.a. Pure ALOHA)
2) Slotted ALOHA
3) CSMA (Carrier Sense Multiple Access)
4) CSMA/CD (CSMA with Collision Detection)
5) CSMA/CA (CSMA with Collision Avoidance)
6) CSMA/CA with ACK
7) CSMA/CA with RTS/CTS
© 2016 by Leszek T. Lilien
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 39
Comparison of Throughputsfor ALOHA and Slotted ALOHA
Slotted Aloha
Aloha
0.368
0.184
Traffic load G
Thro
ughput
Sth
G86420
0.5
0.4
0.3
0.2
0.1
0
Max. throughput for ALOHA (A) Sth = 0.184 at G = ½
Max. throughput for Slotted ALOHA (SA) Sth
= 0.368 at G = 1
Notice that Sth for SA is exactly 2 x biggerthan Sth for A
Hypothesis: bec. max. duration of a collision for SA (=2T) is 2 x smaller than for A (=T)
p. 131 (頁147) Fig. 6.6
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 41
6.3.2-B. CSMA (Carrier Sense Multiple Access)
Group of Protocols
Max. throughputs for Pure & Slotted ALOHA are 0.184 & 0.368
CSMA protocols give better throughput than both Aloha protocols
By avoiding collisions
Basic improvement in all CSMA protocols over ALOHA protocols:
Listen to the channel (“sense” for the presence of the “carrier”) before transmitting a packet
Don’t transmit if channel busy
Avoids some collisions - but not all
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 42
Carrier Sense Multiple Access (CSMA)
1-persistent CSMA
Listen before transmit: If the channel is busy,
the station waits until it becomes idle.
If channel sensed idle: transmit entire frame
Time
(Link)
Frame
(Collision)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 43http://3.bp.blogspot.com/-eh0PSxIkw4A/TuY1ImeaIyI/AAAAAAAAAEU/pnGzPDKP7s8/s1600/CSMA-CD.gif
(Link, Channel)
Stations, Nodes, Terminals
CSMA
Link access
Half duplex (vs. Full duplex):
nodes at both ends of link can transmit, but not at same time
(Collision)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 44
Collision Mechanism in CSMA
p. 131 (頁148) Fig. 6.7
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 45
Basic Collision Mechanism in CSMA Protocols
Some collisions avoided
Packet 4 was not sent so it did not collide with Packet 2
Packet 5 was not sent so it did not collide with Packet 3
Collisions can still occur if sensing occurs nearly simulta-neously
Packet 6 collided with Packet 7
7
Time
1 2 3
Collision
6
MS 4 senses,avoids collision
Delay for MS 4
MS 5 senses,avoids collision
MS 5 Delay
MS 1 senses, sends packet
MS 2 senses, sends packet
MS 3 senses,sends packet
MS 6 senses, sends packet
MS 7 senses, sends packet
(Modified by LTL)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 46
Throughput for Different ALOHA and CSMA
Protocols with =0.01
0 1 2 3 4 5 6 7 8 9
Traffic Load G
1.0
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
Thro
ughput
Sth
Aloha
Slotted Aloha
1-persistent CSMA
0.5-persistent CSMA
0.1-persistent CSMA
0.01-persistent CSMA
Nonpersistent CSMA
= / T (p. 132)
- propagation
delayT – packet
transmission time
Recall:p-persistent: transmit with probability p if medium idle
Observe:p = 0.01 is best in this Fig. (others suffer more collisions reducing thruput => “don’t hurry too much”)
(Modified by LTL)
p. 135 (頁152) Fig. 6.9
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 47
1) Basic CSMA, often just CSMA (Carrier Sense Multiple Access)
Sender S starts transmission only if no transmission is ongoing
2) CSMA/CD (CSMA with Collision Detection)
3) CSMA/CA (CSMA with Collision Avoidance)
http://www.tkec.com.tw/image/product/201608/109622_M.jpg?w=130&h=130&t=20131209114632
Types of CSMA Protocols
© 2016 by Leszek T. Lilien
http://www.technologyuk.net/telecommunications/networks/images/csma_cd_04.gif
http://www.techforshare.com/wp-content/uploads/2016/01/wifi-logo.jpg
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 48WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
IEEE Project 802
802.11
CSMA/CA
Network
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 56
6.3.4. CSMA/CD(CSMA with Collision Detection)
In Basic CSMA: If 2 terminals
begin sending packets at the
same time, each will transmit
its complete packet
Even if collision is taking
place
Problem: Wasting medium for
an entire packet duration
Solution principle (main
CSMA/CD idea):
Backoff immediately after a
collision
Modified by LTL
http://3.bp.blogspot.com/-eh0PSxIkw4A/TuY1ImeaIyI/AAAAAAAAAEU/pnGzPDKP7s8/s1600/CSMA-CD.gif
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 57
碰撞(collision)
Ethernet MAC Sublayer Protocol
BEBA:
Binary Exponential Backoff Algorithm
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 65
6.3.5 Types of CSMA/CA
Types of CSMA/CA
1) Basic CSMA/CA
2) CSMA/CA with ACK
3) CSMA/CA with RTS and CTS
http://www.tkec.com.tw/image/product/201608/109622_M.jpg?w=130&h=130&t=20131209114632http://www.techforshare.com/wp-content/uploads/2016/01/wifi-logo.jpg
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 66
TimeMS A’s frame
MSs B & C sensethe medium
MS B resenses the medium and transmits its
frame
MS B’s frame
Backoff -delay for B Backoff -
delay for C
MS C resenses the medium but defers to MS B
6.3.5. CSMA/CA(CSMA with Collision Avoidance)
A basic collision avoidance (CA) scheme
CSMA/CA rule: Backoff before collision (to avoid collisions)
(Modified by LTL)
p. 137 (頁155) Fig. 6.12
Backoff -delay for C
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 69
Rand. backoff period (c)(after deferments)
DIFS
1) Basic CSMA/CA Terminal T senses the medium before xmission1) If medium is busy, T defers access until the end of current xmission - (b1) in Fig.2) If medium is idle or once it becomes idle:
T defers access for time period DIFS - (a) and (b2) in Fig. T picks a random backoff period - (c) in Fig. As long as medium idle during this backoff period, T keeps counting down Whenever medium busy during this backoff period, T freezes its counter After medium becomes idle again:
T defers access for the DIFS period T resumes countdown
T can start transmission when backoff counter = 0
(Modified by LTL)
≤ DIFS
Medium BusyMedium Busy
Contention window (cf. next slide)
Deferred access (b)- deferred till idle (b1) + deferred for DIFS after
became idle (b2)
Slot (cf. next slide)
Time
Could not start xmission (a)since medium became
busy in ≤ DIFS
b1 b2
p. 137 (頁155) Fig. 6.13
DIFS = Distributed InterFrame Space (Collision Avoidance)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 72
Contention Window (CW) Recall: Backoff counter is decreased by 1 each time medium is detected to be idle for an interval of
one time slot
=> backoff period = backoff number (BN) = # of idle slots within CW to wait before being allowed to transmit a frame
Random BN value is chosen based on CW_size CW_size: 31 - 1023 slots (=> BN can be from 31 to 1032)
BN value: uniform distribution over 0 … CW_size
If transmission of a frame unsuccessful & frame to be re-transmitted => CW_size is doubled before retransmission (up to 1023)
© 2016 by Leszek T. Lilien© 2016, Michael Hall, Helsinki Univ. of Technology (sl.19) (Modified by LTL)
1) Basic CSMA/CA – cont. 3
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 74
2) CSMA/CA with ACK Positive Acknowledgement (ACK) frame from receiver upon
reception of each data frame ACK sent after receipt + after time interval SIFS
SIFS = Short Interframe Space
Receiver transmits ACK without sensing the medium (cf. next)
If ACK lost, retransmission of ACK
DIFS
Medium Busy
ACK
Data
OtherMS
SourceMS
DestinationMS
DIFS
SIFS
Contention window
Defer access Backoff after defer
Time
SIFS < DIFSE.g., in 802.11b networks: SIFS = 10 μs / DIFS = 50 μs
(Modified by LTL)
p. 138 (頁156)
Fig. 6.14
ACK
X
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 77
Recal: SIFS < DIFS -- E.g., in 802.11b: SIFS = 10 μs / DIFS = 50 μs
When 2 stations try to access the medium at the same time, the one that has to wait for the shorter SIFS period “wins over” the one that has to wait for the longer DIFS period “Wins over” = waits for shorter time
Just bec. SIFS < DIFS
In other words, ACK frame waiting for SIFS has higher priority over Data frame waiting for DIFS
© 2016 by Leszek T. LilienFigure based on © 2016, Michael Hall, Helsinki Univ. of Technology
CSMA/CA with ACK – cont. 3
Now you see why
medium “reserved” in
quotes - not real
reservation, just given
an advantage to
guarantee it always
wins a race
(Modified by LTL)
C -> D
Data
Data
SIFS
DIFS
V
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 78
When Station S wants to send a frame & channel busy
=> S must wait a backoff time before it may to transmit frame
Reason? Next two slides…
© 2016 by Leszek T. Lilien© 2016, Michael Hall, Helsinki Univ. of Technology (sl. 16)
CSMA/CA with ACK – cont. 4
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 79
No backoff => collision is certain
Suppose that stations B and C waiting to access channel
When channel becomes idle,
B & C start sending their packets at the same time
=> collision!
© 2016 by Leszek T. Lilien© 2016, Michael Hall, Helsinki Univ. of Technology (sl. 17)
CSMA/CA with ACK – cont. 5
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 81
Example for CSMA/CA with ACK
Four stations: A, B, C, D
© 2016 by Leszek T. Lilien© 2016, Michael Hall, Helsinki Univ. of Technology (sl. 21)
Observe:
C attempts to access medium before B does
Coincidentally, C’s backoff number is smaller
(Modified by LTL)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 82© 2016, Michael Hall, Helsinki Univ. of Technology (sl.22)
Example for CSMA/CA with ACK – cont. 1
Observe backoff counter for B:
Frozen when medium becomes busy
When C starts xmission (when C’s backoff counter becomes 0)
B resumes countdown when medium becomes idle After C completes its xmission
(Modified by LTL)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 83© 2016, Michael Hall, Helsinki Univ. of Technology (sl. 23)
Example for CSMA/CA with ACK – cont. 2
Observe backoff counter for D:
Frozen when medium becomes busy When B starts xmission (when B’s backoff counter becomes 0)
D resumes countdown when medium becomes idle After B completes its xmission
(Modified by LTL)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 84
When Station S wants to send a frame & channel busy
=> S must wait a backoff time before it may to transmit frame
Reason? Next two slides…
© 2016 by Leszek T. Lilien© 2016, Michael Hall, Helsinki Univ. of Technology (sl. 16)
Recall: CSMA/CA with ACK
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 85
The hidden/exposed station problem (1)
(a) The hidden station problem.
(b) The exposed station problem.
Copyright © 2016, Andrew S. Tanenbaum, Vrije Univ., Netherlands
X
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 86
A wireless LAN. (a) A transmitting. (b) B transmitting.
Hidden station problem Exposed station problem
X X
The hidden/exposed station problem (2)
Source: 顏春煌,行動與無線通訊,金禾。
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 89
The MACA (Multiple Access with Collision Avoidance)
protocol. (a) A sending an RTS to B.
(b) B responding with a CTS to A.
CSMA/CA with RTS & CTS
Copyright © 2016, Andrew S. Tanenbaum, Vrije Univ., Netherlands
RTS: Request To Send CTS: Clear To Send
How to solve the hidden/exposed station problem?
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 91
存取點(access point)與節點(station)之間的通訊模式
Source: 顏春煌,行動與無線通訊,金禾。
RTS: Request To Send CTS: Clear To Send
(1)
(2)
(3)
(4)
CSMA/CA with RTS & CTS
(including ACK)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 92
CSMA/CA with RTS & CTS
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 2002
(1)
(2)
(3)
(4)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 93
The 802.11 MAC Sublayer ProtocolThe use of virtual channel sensing using CSMA/CA.
NAV: Network Allocation Vector
Copyright © 2016, Andrew S. Tanenbaum, Vrije Univ., Netherlands
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 94
3) CSMA/CA with RTS and CTS
Transmitter sends an RTS (Request To Send) after medium has been idle for time interval > DIFS
Receiver responds with CTS (Clear To Send) after medium has been idle for SIFS
Data can be transmitted (after SIFS)
ACK sent after SIFS
DIFS
RTS
CTS
RTS
Other MS
Source MS
Destination MS
SIFS
Contention window
Defer access Backoff
SIFSData
SIFS
ACK
Time
DIFS
(Modified by LTL)
p. 139 (頁157) Fig. 6.15(1)
(2)
(3)
(4)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 96
Ladder Diagram for CSMA/CA with RTS/CTS
Compare this diagram to the previous one
Source MS Destination MS
Propagation delay
SIFS
SIFS
Propagation delay
Propagation delay
Propagation delay
SIFS
DIFS
DIFS
Other MS
3) CSMA/CA with RTS and CTS – cont. 1a
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 102
Advantages of RTS & CTS
Advantage #1 of RTS/CTS:
Reduces collision probability if the data frame is very longcompared to the RTS frame
Does not prevent collisions during very short RTS frames
Not a big problem - they are not very likely
Prevents more likely collisions during long data frame
© 2016, Michael Hall, Helsinki Univ. of Technology (sl. 28)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 107
The End of Section 6Questions?
Thank you.
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 108
The End of Section 6Exercises:P6.10 碰撞偵測(Collision detection)與碰撞避免(Collision avoidance)的差異為何?
P6.11 在CSMA/CA使用RTS/CTS的目的為何?
P6.21 利用您喜愛的網站搜尋,找出何謂隱藏終端節點問題與暴露節點問題,請詳加描述您如何處理這種問題。