Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

80
1 Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

description

Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University. Wired Vs Wireless Media Access Both are on shared media. Then, what’s really the problem ?. The Channel Access Problem. Multiple nodes share a channel Pairwise communication desired - PowerPoint PPT Presentation

Transcript of Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

Page 1: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

1

Wireless Medium Access Control

Romit Roy ChoudhuryWireless Networking LecturesDuke University

Page 2: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

2

Wired Vs Wireless Media Access

Both are on shared media.Then, what’s really the problem ?

Page 3: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

3

The Channel Access Problem

Multiple nodes share a channel

Pairwise communication desired Simultaneous communication not possible

MAC Protocols Suggests a scheme to schedule communication

• Maximize number of communications• Ensure fairness among all transmitters

AA CCBB

Page 4: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

4

The Trivial Solution

Transmit and pray Plenty of collisions --> poor throughput at high

load

AA CCBB

collision

Page 5: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

5

The Simple Fix

Transmit and pray Plenty of collisions --> poor throughput at high

load

Listen before you talk Carrier sense multiple access (CSMA) Defer transmission when signal on channel

AA CCBB

Don’ttransmit

Don’ttransmit

Can collisions still occur?Can collisions still occur?

Page 6: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

6

CSMA collisions

Collisions can still occur:Propagation delay non-zero between transmitters

When collision:Entire packet transmission time wasted

spatial layout of nodes

note:Role of distance & propagation delay in determining collision probability

Page 7: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

7

CSMA/CD (Collision Detection)

Keep listening to channel While transmitting

If (Transmitted_Signal != Sensed_Signal) Sender knows it’s a Collision ABORT

Page 8: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

8

2 Observations on CSMA/CD

Transmitter can send/listen concurrently If (Sensed - received = null)? Then success

The signal is identical at Tx and Rx Non-dispersive

The TRANSMITTER can detect if and when collision occurs

The TRANSMITTER can detect if and when collision occurs

Page 9: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

9

Unfortunately …

Both observations do not hold for wireless

Because …

Page 10: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

10

Wireless Medium Access Control

A B

C D

Distance

Signalpower

SINR threhold

Page 11: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

11

Wireless Media Disperse Energy

A B

C D

Distance

Signalpower

SINR threhold

A cannot send and listen in parallel

Signal not same at different locations

Page 12: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

12

Collision Detection Difficult

Signal reception based on SINR Transmitter can only hear itself Cannot determine signal quality at

receiver

A CD

B

Page 13: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

13

Calculating SINR

AB

C

CB

CtransmitC

B

AB

AAB

d

PI

d

PSoI

NNoiseIceInterferen

SoIterestSignalOfInSINR

transmit

)()(

)(

CB

Ctransmit

AB

A

AB

d

PN

d

P

SINR

transmit

D

Page 14: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

14

A B

C D

Distance

Signalpower

SINR threhold

Red signal >> Blue signal

X

Red < Blue = collision

Page 15: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

15

A B

C D

Distance

Signalpower

SINR threhold

Important: C has not heard A, but can interfere at receiver B

X

C is the hidden terminal to A

Page 16: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

16

A B

C D

Distance

Signalpower

SINR threhold

Important: X has heard A, but should not defer transmission to Y

X

X is the exposed terminal to AY

Page 17: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

17

Any Questions at this point?

Page 18: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

18

So, how do we cope withHidden/Exposed Terminals?

Page 19: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

19

A B

C D

Distance

Signalpower

SINR threhold

X

How to prevent C from trasmitting?

Page 20: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

20

A Project Idea!

A B

C D

A node decides to intelligently choose a Carrier sensing threshold (T)

The node senses channel If signal > T, then node does not transmit If signal < T, then don’t transmit

Possible to guarantee no collisions?

Page 21: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

21

A B

C D

Distance

Signalpower

SINR threhold

X

A Project Idea!

Sensitivity threshold

Page 22: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

22

A B

C D

Distance

Signalpower

SINR threhold

Sensitivity threshold

X

T

A Project Idea!Will this solve the wireless MAC problem? Do not transmit in this region

Page 23: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

23

Whatever the answer …

This is an example of a good class project

If you came up with the idea,Showed that it’s a new idea,

And evaluated it to demo how it performs

Page 24: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

24

The Emergence of MACA, MACAW, & 802.11

Wireless MAC proved to be non-trivial

1992 - research by Karn (MACA) 1994 - research by Bhargavan (MACAW)

Led to IEEE 802.11 committee The standard was ratified in 1999

Page 25: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

25

CTS = Clear To Send

RTS = Request To Send

IEEE 802.11

D

Y

S

M

K

RTS

CTS

X

Page 26: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

26

IEEE 802.11

D

Y

S

X

M

Ksilenced

silenced

silenced

silencedData

ACK

Page 27: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

27

802.11 Steps

All backlogged nodes choose a random number R = rand (0, CW_min)

Each node counts down R Continue carrier sensing while counting down Once carrier busy, freeze countdown

Whoever reaches ZERO transmits RTS Neighbors freeze countdown, decode RTS RTS contains (CTS + DATA + ACK) duration = T_comm Neighbors set NAV = T_comm

• Remains silent for NAV time

Page 28: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

28

802.11 Steps

Receiver replies with CTS Also contains (DATA + ACK) duration. Neighbors update NAV again

Tx sends DATA, Rx acknowledges with ACK After ACK, everyone initiates remaining countdown Tx chooses new R = rand (0, CW_min)

If RTS or DATA collides (i.e., no CTS/ACK returns) Indicates collision RTS chooses new random no. R1 = rand (0, 2*CW_min) Note Exponential Backoff Ri = rand (0, 2^i * CW_min) Once successful transmission, reset to rand(0, CW_min)

Page 29: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

29

But is that enough?

Page 30: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

30

RTS/CTS

Does it solve hidden terminals ? Assuming carrier sensing zone =

communication zone

C

F

A B

E

D

CTS

RTS

E does not receive CTS successfully Can later initiate transmission to D.Hidden terminal problem remains.

E does not receive CTS successfully Can later initiate transmission to D.Hidden terminal problem remains.

Page 31: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

31

Hidden Terminal Problem

How about increasing carrier sense range ?? E will defer on sensing carrier no

collision !!!

CB DData

A

E

CTS

RTSF

Page 32: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

32

Hidden Terminal Problem

But what if barriers/obstructions ?? E doesn’t hear C Carrier sensing does not

help

CB DData

A

EF

CTS

RTS

Page 33: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

33

Exposed Terminal

B should be able to transmit to A RTS prevents this

CA B

E

D

CTSRTS

Page 34: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

34

Exposed Terminal

B should be able to transmit to A Carrier sensing makes the situation worse

CA B

E

D

CTSRTS

Page 35: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

35

Thoughts !

802.11 does not solve HT/ET completely Only alleviates the problem through RTS/CTS and

recommends larger CS zone

Large CS zone aggravates exposed terminals Spatial reuse reduces A tradeoff RTS/CTS packets also consume bandwidth Moreover, backing off mechanism is also wasteful

The search for the best MAC protocol is still on. However, 802.11 is being optimized too.Thus, wireless MAC research still alive

Page 36: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

36

Takes on 802.11

Role of RTS/CTS Useful? No? Is it a one-fit-all? Where does it not fit?

Is ACK necessary? MACA said no ACKs. Let TCP recover from losses

Should Carrier Sensing replace RTS/CTS?

New opportunities may not need RTS/CTS Infratructured wireless networks (EWLAN)

Page 37: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

37

MACA-BI [GerlaUCLA]

RTS/CTS/ACK are control overhead Needed to reduce it

Rx predicts trasmission from the Tx Traffic estimation (???)

If Rx thinks Tx has pending packets for Rx Rx transmits RTR to Tx Tx replies with Data

Improves MACA with no RTS/ACK improvement but not too much

Page 38: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

38

DBTMA [HaasCornell98]

A B X Y

RTS CTS Signal X

Rx Busy tone

A B X Y

CTS RTS Signal X

Tx Busy toneTx Busy tone

Page 39: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

39

Implicit MACKnowledgment

APs typically backlogged with traffic Persistent traffic possibility of optimzation

We propose an implicit ACK optimization Piggyback the CTS with ACK for previous

dialog802.11

Implicit ACK

Gain

Page 40: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

40

Hybrid Channel Access

The optimization timeline

T RRTS

CTS

Data

ACK

RTS

CTS

Data

ACK

T RRTS

CTS

Data

RTS

CTS +ACK

Data

T RRTS

CTS

Data

Poll +ACK

Data

RTS

CTS +ACK

Bac

kof

f

Bac

kof

fB

ack

off

Bac

kof

f

Poll +ACK

Data

Bac

kof

fB

ack

off

802.11802.11 Implicit ACKImplicit ACK Hybrid Channel AccessHybrid Channel Access

Page 41: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

41

Seedex [KumarUIUC03]

Forget channel reservation and backoff Instead, let nodes pick sequence of time slots

Decides to probably transmit in some, else listen Transmit slots chosen using a random seed Publishes the seed to 2-hop neighbors

When PT slots arrive, nodes transmit with Probability “p” “p” chosen as a function of overlapping neighbors

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 42: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

42

Hot Research Topics

Power control increases spatial reuse Whisper in the room so that many people can talk

Rate control based on channel quality Expolit channel diversity

Utilize multiple channels to parallelize dialogs

Exploit spatial diversity Use directional antennas to interfere over smaller

region (next class)

… and many more topics

Page 43: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

43

Questions ?

Page 44: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

44

Announcements

Reviews: You are forgetting to appreciate the paper There is a reason why the paper was accepted

Please organize your papers/reviews Would be valuable later in career You never know what you will do after 5 years

Meet me with slides before you present Email for an appointment Don’t have to review if you are presenter

Page 45: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

45

Announcements

Review Template: Problem definition? Why is it important? Validity of models and assumptions Solution Evaluation

Email review to TA (CC to me) Bring print out to class Name-date-subject in email subject Will post example reviews on webpage

Some of you still doing summaries.

Page 46: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

46

Backup slides onIEEE 802.11

Read for more details

Page 47: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

47

Today’s Discussions

IEEE 802.11 overview - some raw data Architecture PHY specifications – Spread Spectrum radios: FH & DS MAC specifications – DCF and PCF Synchronization, Power management, Roaming,

Scanning Security

Deliberations on 802.11 (DCF) MAC Hidden terminal & Exposed terminal issues Carrier sensing

Some other ideas & open challenges Could be interesting for the project

Page 48: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

48

IEEE 802.11 – An overview

Page 49: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

49

IEEE 802.11 in OSI Model

Wireless

Page 50: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

50

802.11 Scope & Modules

MAC Sublayer

MAC LayerManagement

PLCP Sublayer

PMD Sublayer

PHY LayerManagement

LLC

MAC

PHY

To develop a MAC and PHY spec for wirelessconnectivity for fixed, portable and moving stationsin a local area

Page 51: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

51

Applications

Single Hop Home networks Enterprise networks (e.g., offices, labs, etc.) Outdoor areas (e.g., cities, parks, etc.)

Multi-hops Adhoc network of small groups

(e.g.,aircrafts) Balloon networks (SpaceData Inc.) Mesh networks (e.g., routers on lamp-posts)

Page 52: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

52

802.11 Architecture – Two modes

Page 53: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

53

802.11 PHY Technologies

Two kinds of radios based on “Spread Spectrum” “Diffused Infrared”

Spread Spectrum radios based on Frequency hopping (FH) Direct sequence (DS)

Radio works in 2.4GHz ISM band --- license-free by FCC (USA), ETSI (Europe), and MKK (Japan) 1 Mbps and 2Mbps operation using FH 1, 2, 5.5, and 11Mbps operation using DSSS (FCC)

Page 54: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

54

Why Spread Spectrum ?

C = B*log2(1+S/N) . . . [Shannon] To achieve the same channel capacity C

Large S/N, small B Small S/N, large B Increase S/N is inefficient due to the logarithmic relationship

power

B

signalnoise, interferences

power

signal

Bfrequency

e.g. B = 30 KHz e.g. B = 1.25 MHz

Page 55: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

55

Spread Spectrum

Reduce effect of jamming Military scenarios

Reduce effect of other interferences More “secure”

Signal “merged” in noise and interference

Methods for spreading the bandwidth of the transmitted signal over a frequency band (spectrum)

which is wider than the minimum bandwidth required to transmit the signal.

Page 56: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

56

Frequency Hopping SS (FHSS)

2.4GHz band divided into 75 1MHz subchannels

Sender and receive agree on a hopping pattern (pseudo random series). 22 hopping patterns defined

Different hopping sequences enable co-existence of multiple BSSs

Robust against narrow-band interferences

f f f f f f f f f f f

One possible pattern

Page 57: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

57

FHSS due to [Lamarr1940]power

B

signalnoise, interferences

power

signal

Bfrequencyf f f f f f f f f f f

Invented by Hedy Lamarr (Hollywood film star) in 1940, at age of 27, with musician George Antheil

Simple radio design with FHSSData rates ~ 2 Mbps

Page 58: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

58

Direct Sequence SS

Direct sequence (DS): most prevalent Signal is spread by a wide bandwidth

pseudorandom sequence (code sequence) Signals appear as wideband noise to

unintended receivers

Not for intra-cell multiple access Nodes in the same cell use same code

sequence

Page 59: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

59

IEEE 802.11b DSSS

ISM unlicensed frequency band (2.4GHz)

Channel bandwidth: fhigh – flow = 22 MHz

1MHz guard band Direct sequence

spread spectrum in each channel

3 non-overlapping channels

Channel flow fhigh

1 2.401 2.423

2 2.404 2.428

3 2.411 2.433

4 2.416 2.438

5 2.421 2.443

6 2.426 2.448

7 2.431 2.453

8 2.436 2.458

9 2.441 2.463

10 2.446 2.468

11 2.451 2.473

Page 60: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

60

Diffused Infrared

Wavelength range from 850 – 950 nm For indoor use only Line-of-sight and reflected transmission 1 – 2 Mbps

Page 61: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

61

PHY Sublayers

Physical layer convergence protocol (PLCP) Provides common interface for MAC

• Offers carrier sense status & CCA (Clear channel assesment)

• Performs channel synchronization / training

Physical medium dependent sublayer (PMD) Functions based on underlying channel quality

and characteristics• E.g., Takes care of the wireless encoding

Page 62: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

62

PLCP (802.11b)

longpreamble

192us

shortpreamble

96us(VoIP, video)

Page 63: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

63

PLCP (802.11b)long

preamble192us

shortpreamble

96us(VoIP, video)

Note:

To send even one bit payloadreliably, you will have to form a packet with the PLCP preambleand the PLCP header.

This constraints protocol design

You cannot arbitrarily exchangecontrol messages.

What are the control messagesin IEEE 802.11 ?

Page 64: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

64

IEEE 802.11 MAC

Page 65: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

65

802.11 MAC (DCF)

CSMA/CA based protocol Listen before you talk CA = Collision avoidance (prevention is better than cure !!)

Robust for interference Explicit acknowledgment requested from receiverExplicit acknowledgment requested from receiver

• for unicast frames Only CSMA/CA for Broadcast frames

Optional RTS/CTS offers Virtual Carrier Sensing RTS/CTS includes duration of immediate dialog Addresses hidden terminal problems

Page 66: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

66

802.11 MAC (DCF)

Page 67: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

67

Physical Carrier Sense & Backoff

Page 68: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

68

MAC Management Layer

Synchronization Finding and staying with a WLAN

• Uses TSF timers and beacons

Power Management Sleeping without missing any messages

• Periodic sleep, frame buffering, traffic indication map

Association and Reassociation Joining a network Roaming, moving from one AP to another Scanning

Page 69: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

69

Synchronization

Timing Synchronization Function (TSF) Enables synchronous waking/sleeping Enables switching from DCF to PCF Enables frequency hopping in FHSS PHY

• Transmitter and receiver has identical dwell interval at each center frequency

Achieving TSF All stations maintain a local timer. AP periodically broadcasts beacons containing

timestamps, management info, roaming info, etc.• Not necessary to hear every beacon

Beacon synchronizes entire BSS• Applicable in infrastructure mode ONLY

Distributed TSF (for Independent BSS) more difficult

Page 70: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

70

Power management Battery powered devices require power efficiency

LAN protocols assume idle nodes are always ON and thus ready to receive.

Idle-receive state key source of power wastage

Devices need to power off during idle periods Yet maintain an active session – tradeoff power Vs throughput

Achieving power conservation Allow idle stations to go to sleep periodically APs buffer packets for sleeping stations AP announces which stations have frames buffered

when all stations are awake – called Traffic Indication Map (TIM)

• TSF assures AP and Power Save stations are synchronized • TSF timer keeps running when stations are sleeping

Independent BSS also have Power Management Similar in concept, distributed approach

Page 71: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

71

Roaming & Scanning

Stations switch (roam) to different AP When channel quality with current AP is poor

Scanning function used to find better AP Passive Scanning Listen for beacon from different Aps Active Scanning Exchange explicit beacons to determine

best AP

Station sends Reassociation Request to new AP If Reassociation Response successful Roaming

If AP accepts Reassociation Request AP indicates Reassociation to the Distribution System Distribution System information is updated Normally old AP is notified through Distribution System

Page 72: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

72

MAC management frame

Beacon Timestamp, Beacon Interval, Capabilities, ESSID,

Supported Rates, parameters Traffic Indication Map

Probe ESSID, Capabilities, Supported Rates

Probe Response Timestamp, Beacon Interval, Capabilities, ESSID,

Supported Rates, parameters same for Beacon except for TIM

Association Request Capability, Listen Interval, ESSID, Supported Rates

Association Response Capability, Status Code, Station ID, Supported Rates

Page 73: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

73

MAC Management Frame

Reassociation Request Capability, Listen Interval, ESSID, Supported Rates,

Current AP Address

Reassociation Response Capability, Status Code, Station ID, Supported Rates

Disassociation Reason code

Authentication Algorithm, Sequence, Status, Challenge Text

Deauthentication Reason

Page 74: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

74

Security Range of attacks huge in wireless

Easy entry into the network Jamming, selfish behavior, spatial overhearing

Securing the network harder than wired networks Especially in distributed environments

WEP symmetric 40 or 128-bit encryption WPA: Wi-Fi protected access

Temporal key integrity protocol (TKIP) – better User authentication

IEEE 802.11i – Efforts toward higher security

Page 75: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

75

PLCP

PLCP has two structures. All 802.11b systems have to support Long preamble. Short preamble option is provided to improve efficiency

when trasnmitting voice, VoIP, streaming video.

PLCP Frame format PLCP preamble

• SFD: start frame delimiter PLCP header

Page 76: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

76

PLCP Header

8-bit signal or data rate (DR) indicates how fast data will be transmitted

8-bit service field reserved for future 16-bit length field indicating the length of

the ensuing MAC PDU (MAC sublayer’s Protocol Data Unit)

16-bit Cyclic Redundancy Code

Page 77: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

77

Power management approach

Allow idle stations to go to sleep station’s power save mode stored in AP

APs buffer packets for sleeping stations. AP announces which stations have frames buffered Traffic Indication Map (TIM) sent with every Beacon

Power Saving stations wake up periodically listen for Beacons

TSF assures AP and Power Save stations are synchronized stations will wake up to hear a Beacon TSF timer keeps running when stations are sleeping synchronization allows extreme low power operation

Independent BSS also have Power Management similar in concept, distributed approach

Page 78: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

78

Scanning

Scanning required for many functions. finding and joining a network finding a new AP while roaming initializing an Independent BSS (ad hoc) network

802.11 MAC uses a common mechanism for all PHY. single or multi channel passive or active scanning

Passive Scanning Find networks simply by listening for Beacons

Active Scanning On each channel Send a Probe, Wait for a Probe

Response Beacon or Probe Response contains information necessary

to join new network.

Page 79: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

79

Active scanning example

Page 80: Wireless Medium Access Control Romit Roy Choudhury Wireless Networking Lectures Duke University

80

Collision Detection

What is the aim of collision detection ?

It’s a transmitter’s job:

To determine if the packet was successfully received without explicitly asking the receiver

It’s a transmitter’s job:

To determine if the packet was successfully received without explicitly asking the receiver