Chapter 6: Multiple Radio Access

62
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 1 Chapter 6 Multiple Radio Access Adapted from class notes by Prof. Leszek T. Lilien, CS, Western Michigan University and Prof. Dharma P. Agrawal & Qing-An Zeng, University of Cincinnati Most slides based on publishers slides for 1 st and 2 nd edition of: Introduction to Wireless and Mobile Systems by Agrawal & Zeng © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved.

Transcript of Chapter 6: Multiple Radio Access

Page 1: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 1

Chapter 6

Multiple Radio Access

Adapted from class notes by

Prof. Leszek T. Lilien, CS, Western Michigan University

and

Prof. Dharma P. Agrawal & Qing-An Zeng, University of Cincinnati

Most slides based on publisher’s slides for 1st and 2nd edition of: Introduction to Wireless and Mobile Systems by Agrawal & Zeng

© 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved.

Page 2: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 3

Multiple access (Medium Access Control, MAC)

Multiple

Access Medium

MS 4

MS 3

MS 2

MS 1…

MS n

(Link, Channel)

p. 126 (頁142) Fig. 6.1

Page 3: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 6

Introduction (Cont’d)

Multiple access issues

If more than one node transmit at a time on the control channel to BS, a collision occurs

How to determine which node can transmit to BS?

Multiple access protocols

Solving multiple access issues

Different types:

Contention protocols resolve a collision after it occurs. These protocols execute a collision resolution protocol after each collision. (Chapter 6)

Collision-free protocols (e.g., a bit-map protocol and binary countdown) ensure that a collision can never occur. (Chapter 7)

(Collision)

Page 4: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 7

Medium-

sharing

Techniques

Static

Channelization

Dynamic

Medium Access

Control

Scheduled

Random

Access

eg., FDM, TDM (Ch.7)

eg., Ethernet, WiFi (Ch. 6)

(Broadcast channels)

(Multiaccess channels)

Random access channels

Medium (Channel) Sharing Techniques

Page 5: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 9

Recall ISO Open Systems Interconnection Reference Model for

networks

Communication subnetwork = 3 lowest layers of OSI

Network layer (NET)

Data link layer (DLL)

Physical layer (PHY)

6.2. Multiple (Radio) Access Protocols = MAC

Sublayer Protocols

© 2016 by Leszek T. Lilien

DLL

NET

Page 6: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 10

Why do we need MAC?

Contention and Collision Avoidance ! ieee802.11WirelessNet

Prof. Tseng, NCTU

Page 7: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 11

Why Do We Need MAC?

Fairness !!! ieee802.11WirelessNet

Prof. Tseng, NCTU

Page 8: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 15

applicationapplication

presentation

session

transport

network

data link

physical

7

6

5

4

3

2

1

data

data

data

data

data

data

data

AH

AHPH

AHPHSH

AHPHSHTH

AHPHSHTHNH

AHPHSHTHNH

bit streams

DT

H: header

T: trail

Each may be empty.

DH

Review on Computer Networks

Ch.4 The Medium Access Control Sublayer

Session

Transport

Network

Physical

Presentation

Application

MAC

OSI Reference Model

LLC

Broadcast channel

Page 9: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 16

L3

contr

ol

contr

ol

contr

ol

contr

ol

Logical

Channels

Transport

Channels

C-plane signalling U-plane information

PHY

L2/MAC

L1

RLC

DCNtGC

L2/RLC

MAC

RLC

RLCRLC

RLC

RLCRLC

RLC

Duplication avoidance

UuS boundary

BMCL2/BMC

control

PDCPPDCP L2/PDCP

DCNtGC

Radio

Bearers

RRC

WCDMA

Page 10: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 20

Hawaii

Honolulu

http://a.abcnews.com/images/Travel/GTY_hawaii_kab_140620_12x5_1600.jpg

http://www.punjabigraphics.com/images/155/Aloha-Colorful-Flowers-Picture.jpg

Page 11: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 21

Honolulu

https://zh.wikipedia.org/wiki/檀香山#/media/File:Diamond_Head_Honolulu.jpg

Page 12: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 22

Hawaii

Taiwan

https://www.google.com/maps/place

Page 13: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 23https://www.technologyuk.net/telecommunications/networks/images/aloha.gif

檀香山(Honolulu)

Page 14: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 24https://www.technologyuk.net/telecommunications/networks/images/aloha.gif

The ALOHA packet radio system

檀香山(Honolulu)

Page 15: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 25

6.3.1. ALOHA (a.k.a. Pure ALOHA)

Developed in the 1970s for a packet radio network by University

of Hawaii To interconnect islands’ campuses / Single-hop network

Principles:

Sender S may transmit a packet at any time (hoping no collision will

occur)

S finds out whether transmission was successful or experienced

a collision by listening for an ACK broadcast from the

destination station Successful if an ACK arrives within a time-out period T

If no ACK within T, S assumes that there was a collision

=> packet was lost after colliding with packet of another station

If there was a collision, S retransmits after some random time

Analogy: 2 people entering a doorway simultaneously Collision can occur

(Modified by LTL)

Page 16: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 26

ALOHA (in the 1970s)

In pure ALOHA, frames are transmitted at

completely arbitrary times.Stations, Nodes, Terminals

Page 17: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 27

In pure ALOHA, frames are transmitted

at completely arbitrary times

CollisionCollisionTime

Stations, Nodes, Terminals

Pure ALOHA (in the 1970s)

Page 18: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 28

6.3.1. ALOHA – cont.

Collision in Pure ALOHA (can last up to 2T)

1 2 3 3 2Time

Collision

Retransmission Retransmission

MS 1 packetWait for a random time

MS 2 packet

MS 3 packet

t - T t t + TT

Recall ALOHA principles:

Sender S may transmit a packet at any time

S waits for an ACK broadcast from the destination station

If there was a collision, S retransmits after some random time

Example: Packet 2 from MS2 & Packet 3 from MS3 collide

MS3 retransmits Packet 3 pretty soon (random wait)

MS2 retransmits Packet 2 much later (random wait)

Note: Collision can block channel for period up to 2T (Vulnerable period)

(Modified by LTL)

p. 129 (頁145) Fig. 6.4

Page 19: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 29

Pure ALOHA: Performance

Vulnerable period (2t) for the shaded frame.

2t

TimeFrame

Frame

Page 20: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 30

Throughput of ALOHA (cont.)

• T – packet length (duration)

• Successful Probability in time 2T:

where G = gT is normalized offerred traffic load for the channel

G

th eGTPGS 2

0 2 • Throughput:

184.02

1max

eS

• Maximum throughput for ALOHA (G=1/2)

(Modified by LTL)

.!0

)2()2( 22

0

0

GgT eegT

TP

Ps = P(no collision)= P(no transmission in two packets time)= P(no transmission in 2T)

=

Page 21: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 31

Throughput for ALOHA

Slotted Aloha

Aloha

0.368

0.184

Traffic load G

Thro

ughput

Sth

(Modified by LTL)

G86420

0.5

0.4

0.3

0.2

0.1

0

Max. throughputfor ALOHASth = 0.184 at G = ½

p. 131 (頁147) Fig. 6.6

0.184

Page 22: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 32

Improvements over Pure ALOHA:

Time is slotted

Slot length = packet length (duration) = T

Packet transmission can start only at the beginning of

a slot

This reduces collision duration

Pure ALOHA: If Packet 1 is almost finished when it

collides with just-starting Packet 2, collision can lasts for

nearly T+T = 2T

Slotted ALOHA: 2 Packets can collide only when both are

just starting => collision can last at most T

(Modified by LTL)

6.3.2. Slotted ALOHA

Page 23: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 33

6.3.2. Slotted ALOHA – cont.

Collision in Slotted ALOHA (can last max. T)

1 2&3 2Time

Collision

Retransmission Retransmission

3

Slots

MS 1 packet

MSs 2 & 3 packets Wait for a random time

Example: Packet 2 from MS2 & Packet 3 from MS3 collide

MS2 retransmits Packet 2 pretty soon (random wait)

MS3 retransmits Packet 3 much later (random wait)

Note: Shows again that collision can block channel for period T

(Modified by LTL)

p. 130 (頁146) Fig. 6.5

2 & 3

Page 24: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 34

Slotted ALOHA: PerformanceVulnerable period (t) for the shaded frame.

t

Deferred to next slot

Time

Frame

Page 25: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 35

Throughput of Slotted ALOHA

. ,0 gTGeTP G

• Probability of no collision

G

oth eGTPGS

• Throughput:

368.01

max e

S

• Maximum throughput for slotted ALOHA (G = 1)

Page 26: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 36

6.1. Introduction

© 2016 by Leszek T. Lilien

Recall

Large # of traffic

channels on each BS Because traffic channels used by

1 MS exclusively for call duration

Collision-free protocols (Ch.7)

Small # of control

channels (CC) on each BS Because control channels

shared by many MSs

for short periods

Too expensive/inefficient to assign control channel for call duration

Contention protocols (Ch.6)

MSs compete for these few shared control channels For call setup, etc.

BSMS1

p. 19 (頁19) Fig. 1.20

MS2

Page 27: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 37

Classification of

Multiple Access

Protocols

Random access protocols – upon collision, retrans-mit after a ran-dom delay

Collision resolution protocols - upon collision, retransmit according to a more sophisti-cated method

Multiple-access protocols

Contention-based Collision-free

Random access Collision resolution

FDMA

TDMA

CDMA

Token Bus

DQDB

etc.

ALOHA

CSMA

BTMA,

ISMA

etc.

TREE

WINDOW

etc.

DQDB: Distributed Queue Dual Bus BTMA: Busy Tone Multiple Access

ISMA: Idle Signal Multiple Access

ALOHA and CSMA protocols will be discussed in this section.

p. 127 (頁143) Fig. 6.3

(Chapter 6) (Chapter 7)

Page 28: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 38

6.3. Contention-Based Protocols

Major categories of contention-based protocols

1) ALOHA (a.k.a. Pure ALOHA)

2) Slotted ALOHA

3) CSMA (Carrier Sense Multiple Access)

4) CSMA/CD (CSMA with Collision Detection)

5) CSMA/CA (CSMA with Collision Avoidance)

6) CSMA/CA with ACK

7) CSMA/CA with RTS/CTS

© 2016 by Leszek T. Lilien

Page 29: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 39

Comparison of Throughputsfor ALOHA and Slotted ALOHA

Slotted Aloha

Aloha

0.368

0.184

Traffic load G

Thro

ughput

Sth

G86420

0.5

0.4

0.3

0.2

0.1

0

Max. throughput for ALOHA (A) Sth = 0.184 at G = ½

Max. throughput for Slotted ALOHA (SA) Sth

= 0.368 at G = 1

Notice that Sth for SA is exactly 2 x biggerthan Sth for A

Hypothesis: bec. max. duration of a collision for SA (=2T) is 2 x smaller than for A (=T)

p. 131 (頁147) Fig. 6.6

Page 30: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 41

6.3.2-B. CSMA (Carrier Sense Multiple Access)

Group of Protocols

Max. throughputs for Pure & Slotted ALOHA are 0.184 & 0.368

CSMA protocols give better throughput than both Aloha protocols

By avoiding collisions

Basic improvement in all CSMA protocols over ALOHA protocols:

Listen to the channel (“sense” for the presence of the “carrier”) before transmitting a packet

Don’t transmit if channel busy

Avoids some collisions - but not all

Page 31: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 42

Carrier Sense Multiple Access (CSMA)

1-persistent CSMA

Listen before transmit: If the channel is busy,

the station waits until it becomes idle.

If channel sensed idle: transmit entire frame

Time

(Link)

Frame

(Collision)

Page 32: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 43http://3.bp.blogspot.com/-eh0PSxIkw4A/TuY1ImeaIyI/AAAAAAAAAEU/pnGzPDKP7s8/s1600/CSMA-CD.gif

(Link, Channel)

Stations, Nodes, Terminals

CSMA

Link access

Half duplex (vs. Full duplex):

nodes at both ends of link can transmit, but not at same time

(Collision)

Page 33: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 44

Collision Mechanism in CSMA

p. 131 (頁148) Fig. 6.7

Page 34: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 45

Basic Collision Mechanism in CSMA Protocols

Some collisions avoided

Packet 4 was not sent so it did not collide with Packet 2

Packet 5 was not sent so it did not collide with Packet 3

Collisions can still occur if sensing occurs nearly simulta-neously

Packet 6 collided with Packet 7

7

Time

1 2 3

Collision

6

MS 4 senses,avoids collision

Delay for MS 4

MS 5 senses,avoids collision

MS 5 Delay

MS 1 senses, sends packet

MS 2 senses, sends packet

MS 3 senses,sends packet

MS 6 senses, sends packet

MS 7 senses, sends packet

(Modified by LTL)

Page 35: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 46

Throughput for Different ALOHA and CSMA

Protocols with =0.01

0 1 2 3 4 5 6 7 8 9

Traffic Load G

1.0

0.9

0.8

0.7

0.6

0.5

0.4

0.3

0.2

0.1

0

Thro

ughput

Sth

Aloha

Slotted Aloha

1-persistent CSMA

0.5-persistent CSMA

0.1-persistent CSMA

0.01-persistent CSMA

Nonpersistent CSMA

= / T (p. 132)

- propagation

delayT – packet

transmission time

Recall:p-persistent: transmit with probability p if medium idle

Observe:p = 0.01 is best in this Fig. (others suffer more collisions reducing thruput => “don’t hurry too much”)

(Modified by LTL)

p. 135 (頁152) Fig. 6.9

Page 36: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 47

1) Basic CSMA, often just CSMA (Carrier Sense Multiple Access)

Sender S starts transmission only if no transmission is ongoing

2) CSMA/CD (CSMA with Collision Detection)

3) CSMA/CA (CSMA with Collision Avoidance)

http://www.tkec.com.tw/image/product/201608/109622_M.jpg?w=130&h=130&t=20131209114632

Types of CSMA Protocols

© 2016 by Leszek T. Lilien

http://www.technologyuk.net/telecommunications/networks/images/csma_cd_04.gif

http://www.techforshare.com/wp-content/uploads/2016/01/wifi-logo.jpg

Page 37: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 48WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998

IEEE Project 802

802.11

CSMA/CA

Network

Page 38: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 56

6.3.4. CSMA/CD(CSMA with Collision Detection)

In Basic CSMA: If 2 terminals

begin sending packets at the

same time, each will transmit

its complete packet

Even if collision is taking

place

Problem: Wasting medium for

an entire packet duration

Solution principle (main

CSMA/CD idea):

Backoff immediately after a

collision

Modified by LTL

http://3.bp.blogspot.com/-eh0PSxIkw4A/TuY1ImeaIyI/AAAAAAAAAEU/pnGzPDKP7s8/s1600/CSMA-CD.gif

Page 39: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 57

碰撞(collision)

Ethernet MAC Sublayer Protocol

BEBA:

Binary Exponential Backoff Algorithm

Page 40: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 65

6.3.5 Types of CSMA/CA

Types of CSMA/CA

1) Basic CSMA/CA

2) CSMA/CA with ACK

3) CSMA/CA with RTS and CTS

http://www.tkec.com.tw/image/product/201608/109622_M.jpg?w=130&h=130&t=20131209114632http://www.techforshare.com/wp-content/uploads/2016/01/wifi-logo.jpg

Page 41: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 66

TimeMS A’s frame

MSs B & C sensethe medium

MS B resenses the medium and transmits its

frame

MS B’s frame

Backoff -delay for B Backoff -

delay for C

MS C resenses the medium but defers to MS B

6.3.5. CSMA/CA(CSMA with Collision Avoidance)

A basic collision avoidance (CA) scheme

CSMA/CA rule: Backoff before collision (to avoid collisions)

(Modified by LTL)

p. 137 (頁155) Fig. 6.12

Backoff -delay for C

Page 42: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 69

Rand. backoff period (c)(after deferments)

DIFS

1) Basic CSMA/CA Terminal T senses the medium before xmission1) If medium is busy, T defers access until the end of current xmission - (b1) in Fig.2) If medium is idle or once it becomes idle:

T defers access for time period DIFS - (a) and (b2) in Fig. T picks a random backoff period - (c) in Fig. As long as medium idle during this backoff period, T keeps counting down Whenever medium busy during this backoff period, T freezes its counter After medium becomes idle again:

T defers access for the DIFS period T resumes countdown

T can start transmission when backoff counter = 0

(Modified by LTL)

≤ DIFS

Medium BusyMedium Busy

Contention window (cf. next slide)

Deferred access (b)- deferred till idle (b1) + deferred for DIFS after

became idle (b2)

Slot (cf. next slide)

Time

Could not start xmission (a)since medium became

busy in ≤ DIFS

b1 b2

p. 137 (頁155) Fig. 6.13

DIFS = Distributed InterFrame Space (Collision Avoidance)

Page 43: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 72

Contention Window (CW) Recall: Backoff counter is decreased by 1 each time medium is detected to be idle for an interval of

one time slot

=> backoff period = backoff number (BN) = # of idle slots within CW to wait before being allowed to transmit a frame

Random BN value is chosen based on CW_size CW_size: 31 - 1023 slots (=> BN can be from 31 to 1032)

BN value: uniform distribution over 0 … CW_size

If transmission of a frame unsuccessful & frame to be re-transmitted => CW_size is doubled before retransmission (up to 1023)

© 2016 by Leszek T. Lilien© 2016, Michael Hall, Helsinki Univ. of Technology (sl.19) (Modified by LTL)

1) Basic CSMA/CA – cont. 3

Page 44: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 74

2) CSMA/CA with ACK Positive Acknowledgement (ACK) frame from receiver upon

reception of each data frame ACK sent after receipt + after time interval SIFS

SIFS = Short Interframe Space

Receiver transmits ACK without sensing the medium (cf. next)

If ACK lost, retransmission of ACK

DIFS

Medium Busy

ACK

Data

OtherMS

SourceMS

DestinationMS

DIFS

SIFS

Contention window

Defer access Backoff after defer

Time

SIFS < DIFSE.g., in 802.11b networks: SIFS = 10 μs / DIFS = 50 μs

(Modified by LTL)

p. 138 (頁156)

Fig. 6.14

ACK

X

Page 45: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 77

Recal: SIFS < DIFS -- E.g., in 802.11b: SIFS = 10 μs / DIFS = 50 μs

When 2 stations try to access the medium at the same time, the one that has to wait for the shorter SIFS period “wins over” the one that has to wait for the longer DIFS period “Wins over” = waits for shorter time

Just bec. SIFS < DIFS

In other words, ACK frame waiting for SIFS has higher priority over Data frame waiting for DIFS

© 2016 by Leszek T. LilienFigure based on © 2016, Michael Hall, Helsinki Univ. of Technology

CSMA/CA with ACK – cont. 3

Now you see why

medium “reserved” in

quotes - not real

reservation, just given

an advantage to

guarantee it always

wins a race

(Modified by LTL)

C -> D

Data

Data

SIFS

DIFS

V

Page 46: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 78

When Station S wants to send a frame & channel busy

=> S must wait a backoff time before it may to transmit frame

Reason? Next two slides…

© 2016 by Leszek T. Lilien© 2016, Michael Hall, Helsinki Univ. of Technology (sl. 16)

CSMA/CA with ACK – cont. 4

Page 47: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 79

No backoff => collision is certain

Suppose that stations B and C waiting to access channel

When channel becomes idle,

B & C start sending their packets at the same time

=> collision!

© 2016 by Leszek T. Lilien© 2016, Michael Hall, Helsinki Univ. of Technology (sl. 17)

CSMA/CA with ACK – cont. 5

Page 48: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 81

Example for CSMA/CA with ACK

Four stations: A, B, C, D

© 2016 by Leszek T. Lilien© 2016, Michael Hall, Helsinki Univ. of Technology (sl. 21)

Observe:

C attempts to access medium before B does

Coincidentally, C’s backoff number is smaller

(Modified by LTL)

Page 49: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 82© 2016, Michael Hall, Helsinki Univ. of Technology (sl.22)

Example for CSMA/CA with ACK – cont. 1

Observe backoff counter for B:

Frozen when medium becomes busy

When C starts xmission (when C’s backoff counter becomes 0)

B resumes countdown when medium becomes idle After C completes its xmission

(Modified by LTL)

Page 50: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 83© 2016, Michael Hall, Helsinki Univ. of Technology (sl. 23)

Example for CSMA/CA with ACK – cont. 2

Observe backoff counter for D:

Frozen when medium becomes busy When B starts xmission (when B’s backoff counter becomes 0)

D resumes countdown when medium becomes idle After B completes its xmission

(Modified by LTL)

Page 51: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 84

When Station S wants to send a frame & channel busy

=> S must wait a backoff time before it may to transmit frame

Reason? Next two slides…

© 2016 by Leszek T. Lilien© 2016, Michael Hall, Helsinki Univ. of Technology (sl. 16)

Recall: CSMA/CA with ACK

Page 52: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 85

The hidden/exposed station problem (1)

(a) The hidden station problem.

(b) The exposed station problem.

Copyright © 2016, Andrew S. Tanenbaum, Vrije Univ., Netherlands

X

Page 53: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 86

A wireless LAN. (a) A transmitting. (b) B transmitting.

Hidden station problem Exposed station problem

X X

The hidden/exposed station problem (2)

Source: 顏春煌,行動與無線通訊,金禾。

Page 54: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 89

The MACA (Multiple Access with Collision Avoidance)

protocol. (a) A sending an RTS to B.

(b) B responding with a CTS to A.

CSMA/CA with RTS & CTS

Copyright © 2016, Andrew S. Tanenbaum, Vrije Univ., Netherlands

RTS: Request To Send CTS: Clear To Send

How to solve the hidden/exposed station problem?

Page 55: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 91

存取點(access point)與節點(station)之間的通訊模式

Source: 顏春煌,行動與無線通訊,金禾。

RTS: Request To Send CTS: Clear To Send

(1)

(2)

(3)

(4)

CSMA/CA with RTS & CTS

(including ACK)

Page 56: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 92

CSMA/CA with RTS & CTS

WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 2002

(1)

(2)

(3)

(4)

Page 57: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 93

The 802.11 MAC Sublayer ProtocolThe use of virtual channel sensing using CSMA/CA.

NAV: Network Allocation Vector

Copyright © 2016, Andrew S. Tanenbaum, Vrije Univ., Netherlands

Page 58: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 94

3) CSMA/CA with RTS and CTS

Transmitter sends an RTS (Request To Send) after medium has been idle for time interval > DIFS

Receiver responds with CTS (Clear To Send) after medium has been idle for SIFS

Data can be transmitted (after SIFS)

ACK sent after SIFS

DIFS

RTS

CTS

RTS

Other MS

Source MS

Destination MS

SIFS

Contention window

Defer access Backoff

SIFSData

SIFS

ACK

Time

DIFS

(Modified by LTL)

p. 139 (頁157) Fig. 6.15(1)

(2)

(3)

(4)

Page 59: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 96

Ladder Diagram for CSMA/CA with RTS/CTS

Compare this diagram to the previous one

Source MS Destination MS

Propagation delay

SIFS

SIFS

Propagation delay

Propagation delay

Propagation delay

SIFS

DIFS

DIFS

Other MS

3) CSMA/CA with RTS and CTS – cont. 1a

Page 60: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 102

Advantages of RTS & CTS

Advantage #1 of RTS/CTS:

Reduces collision probability if the data frame is very longcompared to the RTS frame

Does not prevent collisions during very short RTS frames

Not a big problem - they are not very likely

Prevents more likely collisions during long data frame

© 2016, Michael Hall, Helsinki Univ. of Technology (sl. 28)

Page 61: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 107

The End of Section 6Questions?

Thank you.

Page 62: Chapter 6: Multiple Radio Access

Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 108

The End of Section 6Exercises:P6.10 碰撞偵測(Collision detection)與碰撞避免(Collision avoidance)的差異為何?

P6.11 在CSMA/CA使用RTS/CTS的目的為何?

P6.21 利用您喜愛的網站搜尋,找出何謂隱藏終端節點問題與暴露節點問題,請詳加描述您如何處理這種問題。