SlideShare a Scribd company logo
1 of 28
IEEE 802.11 CSMA/CA DCF
CSE 6590
Fall 2009
04/23/14 1
04/23/14 2
MAC Requirements
 To avoid interference among simultaneous
transmissions
 But enable as many non-interfering transmission as
possible
 Maintain fairness among transmissions
 No centralized coordinators: fully distributed
operations
 No clock synchronization: asynchronous
operations
04/23/14 3
Carrier Sensing
 Problems
 Hidden terminal problem
 Exposed terminal problem
 Sensing range > Transmission range
 Contention matters only at the receiver’s end
04/23/14 4
Hidden Terminal Problem
A
B
X
No carrier ≠ OK to transmit
04/23/14 5
Exposed Terminal Problem
A
B
XY
Presence of carrier ≠ holds off transmission
04/23/14 6
Existing Work
 MACA [Karn 1990]
 Proposes to solve the hidden terminal problem by
RTS/CTS dialog
 MACAW [Bharghanvan 1994]
 Increasing reliability by RTS/CTS/DATA/ACK dialog
 IEEE 802.11
 Distributed Coordination Function (DCF)
 Also use RTS/CTS/DATA/ACK dialog
04/23/14 7
RTS/CTS dialog (1)
RTS
Defer
Any node hearing this RTS will defer medium access
04/23/14 8
RTS/CTS dialog (2)
RTS
Defer
CTS
Defer
Any node hearing this CTS will defer medium access
04/23/14 9
RTS/CTS/DATA/ACK dialog
Data
Defer
ACK
Defer
04/23/14 10
IEEE 802.11 DCF
 Uses RTS/CTS exchange to avoid hidden
terminal problem
 Any node overhearing a CTS cannot transmit for the
duration of the transfer.
 Any node overhearing an RTS cannot transmit for the
duration of the transfer (to avoid collision with ACK)
 Uses ACK to achieve reliability
 CSMA/CA
 Contention-based random access
 Collision detection not possible while transmitting
04/23/14 11
IEEE 802.11 DCF (cont.)
 Carrier sense in 802.11
 Physical carrier sense
 Virtual carrier sense using Network Allocation Vector
(NAV)
 RTS/CTS specify duration of subsequent DATA/ACK
 NAV is updated based on overheard RTS/CTS
 Collision avoidance
 Nodes stay silent when carrier sensed busy
(physical/virtual)
 Backoff intervals are used to reduce collision
probability
04/23/14 12
Backoff Interval
 When channel is busy, choose a backoff
interval in the range [0, cw].
 Count down the backoff interval when medium
becomes idle.
 Count down is suspended if medium becomes
busy again.
 When backoff interval reaches 0, transmit RTS.
 Binary exponential backoff in 802.11 DCF:
 When a node fails to receive CTS, cw is doubled up
(up to an upper bound).
 When a data transfer completes successfully, cw is
reset to cwmin.
04/23/14 13
IEEE 802.11 CSMA/CA – Example
DIFS: DCF inter-frame space SISF: short inter-frame space
04/23/14 14
Disadvantages of IEEE 802.11 DCF
 High power consumption
 Hidden terminal problem not totally solved
(e.g., collision of RTS)
 Exposed terminal problem not solved
 Fairness problem among different transmitting
nodes
 Only providing best-effort service
Detailed 802.11 DCF
04/23/14 15
Media Access Control
16
Distributed Coordination Function
 DCF sublayer uses CSMA
 if station has frame to send it listens to
medium
 if medium idle, station may transmit
 else waits until current transmission
complete
 No collision detection since on wireless
network
 DCF includes delays that act as a priority
scheme 17
Fig. 6.69 (Leon-Garcia)
Basic CSMA/CA operations
18
IEEE
802.11
Medium
Access
Control
Logic
19
Fig. 6.71 (Leon-Garcia)
Transmission without RTS/CTS
20
Fig. 6.72 (Leon-Garcia)
Transmission with RTS/CTS
21
Priority IFS Values
 SIFS (short IFS)
 for all immediate response actions (see
later)
 PIFS (point coordination function IFS)
 used by the centralized controller in PCF
scheme when issuing polls
 DIFS (distributed coordination function
IFS)
 used as minimum delay for asynchronous
frames contending for access 22
SIFS Use
 SIFS gives highest priority
 over stations waiting PIFS or DIFS time
 SIFS used in following circumstances:
 Acknowledgment (ACK)
 station responds with ACK after waiting SIFS gap
 for efficient collision detect & multi-frame
transmission
 Clear to Send (CTS)
 station ensures data frame gets through by issuing
RTS
 and waits for CTS response from destination
 Poll response
 see Point coordination Function (PCF) discussion
next
23
PIFS and DIFS Use
 PIFS used by centralized controller
 for issuing polls
 has precedence over normal contention
traffic
 but not SIFS
 DIFS used for all ordinary
asynchronous traffic
24
IEEE 802.11 MAC Timing
Basic Access Method
25
IEEE 802.11 MAC Frame Format
26
MAC for Multicast
04/23/14 27
04/23/14 28
MAC for Multicast:
a Challenging Issue
 Multicast: efficient info
delivery from a source to
a set of destinations
simultaneously
 Uses 802.11 CSMA/CA
 Cannot use RTS/CTS
exchange
 Currently there are no
effective MAC protocols
for multicast

More Related Content

What's hot

Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
barodia_1437
 
Demand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple accessDemand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple access
GowriLatha1
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 

What's hot (20)

Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Demand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple accessDemand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple access
 
Csma
CsmaCsma
Csma
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Signaling system 7 (ss7)
Signaling system 7 (ss7)Signaling system 7 (ss7)
Signaling system 7 (ss7)
 
WLAN
WLANWLAN
WLAN
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 

Viewers also liked

9 multiple access
9 multiple access9 multiple access
9 multiple access
ampas03
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
Sonali Chauhan
 
Common protocols
Common protocolsCommon protocols
Common protocols
Mr SMAK
 
Throughput of Slotted Aloha with receiver diversity
Throughput of Slotted Aloha with receiver diversityThroughput of Slotted Aloha with receiver diversity
Throughput of Slotted Aloha with receiver diversity
Matteo Berioli
 

Viewers also liked (20)

CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 
CSMA/CD
CSMA/CDCSMA/CD
CSMA/CD
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
Csmaca
CsmacaCsmaca
Csmaca
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Aloha
AlohaAloha
Aloha
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
 
Common protocols
Common protocolsCommon protocols
Common protocols
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
 
Throughput of Slotted Aloha with receiver diversity
Throughput of Slotted Aloha with receiver diversityThroughput of Slotted Aloha with receiver diversity
Throughput of Slotted Aloha with receiver diversity
 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 

Similar to csma ca

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdf
arihantmobileselepun
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 
Gsm fundamental-uku
Gsm fundamental-ukuGsm fundamental-uku
Gsm fundamental-uku
sivakumar D
 
Chapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptxChapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptx
msohail37
 

Similar to csma ca (20)

csma.pdf
csma.pdfcsma.pdf
csma.pdf
 
3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt
 
3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
 
Mac
MacMac
Mac
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and Frames
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
802 tutorial
802 tutorial802 tutorial
802 tutorial
 
80211
8021180211
80211
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdf
 
iMinds' course: preceding exercises
iMinds' course: preceding exercisesiMinds' course: preceding exercises
iMinds' course: preceding exercises
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
Wireless lecture1
Wireless lecture1Wireless lecture1
Wireless lecture1
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Gsm fundamental-uku
Gsm fundamental-ukuGsm fundamental-uku
Gsm fundamental-uku
 
H018214754
H018214754H018214754
H018214754
 
Opnet lab 2 solutions
Opnet lab 2 solutionsOpnet lab 2 solutions
Opnet lab 2 solutions
 
Chapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptxChapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptx
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

csma ca

  • 1. IEEE 802.11 CSMA/CA DCF CSE 6590 Fall 2009 04/23/14 1
  • 2. 04/23/14 2 MAC Requirements  To avoid interference among simultaneous transmissions  But enable as many non-interfering transmission as possible  Maintain fairness among transmissions  No centralized coordinators: fully distributed operations  No clock synchronization: asynchronous operations
  • 3. 04/23/14 3 Carrier Sensing  Problems  Hidden terminal problem  Exposed terminal problem  Sensing range > Transmission range  Contention matters only at the receiver’s end
  • 4. 04/23/14 4 Hidden Terminal Problem A B X No carrier ≠ OK to transmit
  • 5. 04/23/14 5 Exposed Terminal Problem A B XY Presence of carrier ≠ holds off transmission
  • 6. 04/23/14 6 Existing Work  MACA [Karn 1990]  Proposes to solve the hidden terminal problem by RTS/CTS dialog  MACAW [Bharghanvan 1994]  Increasing reliability by RTS/CTS/DATA/ACK dialog  IEEE 802.11  Distributed Coordination Function (DCF)  Also use RTS/CTS/DATA/ACK dialog
  • 7. 04/23/14 7 RTS/CTS dialog (1) RTS Defer Any node hearing this RTS will defer medium access
  • 8. 04/23/14 8 RTS/CTS dialog (2) RTS Defer CTS Defer Any node hearing this CTS will defer medium access
  • 10. 04/23/14 10 IEEE 802.11 DCF  Uses RTS/CTS exchange to avoid hidden terminal problem  Any node overhearing a CTS cannot transmit for the duration of the transfer.  Any node overhearing an RTS cannot transmit for the duration of the transfer (to avoid collision with ACK)  Uses ACK to achieve reliability  CSMA/CA  Contention-based random access  Collision detection not possible while transmitting
  • 11. 04/23/14 11 IEEE 802.11 DCF (cont.)  Carrier sense in 802.11  Physical carrier sense  Virtual carrier sense using Network Allocation Vector (NAV)  RTS/CTS specify duration of subsequent DATA/ACK  NAV is updated based on overheard RTS/CTS  Collision avoidance  Nodes stay silent when carrier sensed busy (physical/virtual)  Backoff intervals are used to reduce collision probability
  • 12. 04/23/14 12 Backoff Interval  When channel is busy, choose a backoff interval in the range [0, cw].  Count down the backoff interval when medium becomes idle.  Count down is suspended if medium becomes busy again.  When backoff interval reaches 0, transmit RTS.  Binary exponential backoff in 802.11 DCF:  When a node fails to receive CTS, cw is doubled up (up to an upper bound).  When a data transfer completes successfully, cw is reset to cwmin.
  • 13. 04/23/14 13 IEEE 802.11 CSMA/CA – Example DIFS: DCF inter-frame space SISF: short inter-frame space
  • 14. 04/23/14 14 Disadvantages of IEEE 802.11 DCF  High power consumption  Hidden terminal problem not totally solved (e.g., collision of RTS)  Exposed terminal problem not solved  Fairness problem among different transmitting nodes  Only providing best-effort service
  • 17. Distributed Coordination Function  DCF sublayer uses CSMA  if station has frame to send it listens to medium  if medium idle, station may transmit  else waits until current transmission complete  No collision detection since on wireless network  DCF includes delays that act as a priority scheme 17
  • 18. Fig. 6.69 (Leon-Garcia) Basic CSMA/CA operations 18
  • 22. Priority IFS Values  SIFS (short IFS)  for all immediate response actions (see later)  PIFS (point coordination function IFS)  used by the centralized controller in PCF scheme when issuing polls  DIFS (distributed coordination function IFS)  used as minimum delay for asynchronous frames contending for access 22
  • 23. SIFS Use  SIFS gives highest priority  over stations waiting PIFS or DIFS time  SIFS used in following circumstances:  Acknowledgment (ACK)  station responds with ACK after waiting SIFS gap  for efficient collision detect & multi-frame transmission  Clear to Send (CTS)  station ensures data frame gets through by issuing RTS  and waits for CTS response from destination  Poll response  see Point coordination Function (PCF) discussion next 23
  • 24. PIFS and DIFS Use  PIFS used by centralized controller  for issuing polls  has precedence over normal contention traffic  but not SIFS  DIFS used for all ordinary asynchronous traffic 24
  • 25. IEEE 802.11 MAC Timing Basic Access Method 25
  • 26. IEEE 802.11 MAC Frame Format 26
  • 28. 04/23/14 28 MAC for Multicast: a Challenging Issue  Multicast: efficient info delivery from a source to a set of destinations simultaneously  Uses 802.11 CSMA/CA  Cannot use RTS/CTS exchange  Currently there are no effective MAC protocols for multicast

Editor's Notes

  1. The 802.11 working group considered two types of proposals for a MAC algorithm: distributed access protocols, which, like Ethernet, distribute the decision to transmit over all the nodes using a carrier sense mechanism; and centralized access protocols, which involve regulation of transmission by a centralized decision maker. A distributed access protocol makes sense for an ad hoc network of peer workstations (typically an IBSS) and may also be attractive in other wireless LAN configurations that consist primarily of bursty traffic. A centralized access protocol is natural for configurations in which a number of wireless stations are interconnected with each other and some sort of base station that attaches to a backbone wired LAN; it is especially useful if some of the data is time sensitive or high priority. The end result for 802.11 is a MAC algorithm called DFWMAC (distributed foundation wireless MAC) that provides a distributed access control mechanism with an optional centralized control built on top of that. Stallings DCC8e Figure 17.5 illustrates the architecture. The lower sublayer of the MAC layer is the distributed coordination function (DCF). DCF uses a contention algorithm to provide access to all traffic. Ordinary asynchronous traffic directly uses DCF. The point coordination function (PCF) is a centralized MAC algorithm used to provide contention-free service. PCF is built on top of DCF and exploits features of DCF to assure access for its users.
  2. The DCF sublayer makes use of a simple CSMA (carrier sense multiple access) algorithm. If a station has a MAC frame to transmit, it listens to the medium. If the medium is idle, the station may transmit; otherwise the station must wait until the current transmission is complete before transmitting. The DCF does not include a collision detection function (i.e., CSMA/CD) because collision detection is not practical on a wireless network. The dynamic range of the signals on the medium is very large, so that a transmitting station cannot effectively distinguish incoming weak signals from noise and the effects of its own transmission. To ensure the smooth and fair functioning of this algorithm, DCF includes a set of delays that amounts to a priority scheme. Let us start by considering a single delay known as an interframe space (IFS). In fact, there are three different IFS values, but the algorithm is best explained by initially ignoring this detail.
  3. Using an IFS, the rules for CSMA access are as follows (Stallings DCC8e Figure 17.6): 1. A station with a frame to transmit senses the medium. If the medium is idle, it waits to see if the medium remains idle for a time equal to IFS. If so, the station may transmit immediately. 2. If the medium is busy (either because the station initially finds the medium busy or because the medium becomes busy during the IFS idle time), the station defers transmission and continues to monitor the medium until the current transmission is over. 3. Once the current transmission is over, the station delays another IFS. If the medium remains idle for this period, then the station backs off a random amount of time and again senses the medium. If the medium is still idle, the station may transmit. During the backoff time, if the medium becomes busy, the backoff timer is halted and resumes when the medium becomes idle. 4.If the transmission is unsuccessful, which is determined by the absence of an acknowledgement, then it is assumed that a collision has occurred. To ensure that backoff maintains stability, binary exponential backoff, described in Chapter 16, is used. Binary exponential backoff provides a means of handling a heavy load. Repeated failed attempts to transmit result in longer and longer backoff times, which helps to smooth out the load. Without such a backoff, the following situation could occur: Two or more stations attempt to transmit at the same time, causing a collision. These stations then immediately attempt to retransmit, causing a new collision.
  4. The preceding scheme is refined for DCF to provide priority-based access by the simple expedient of using three values for IFS: • SIFS (short IFS): The shortest IFS, used for all immediate response actions, as explained in the following discussion • PIFS (point coordination function IFS): A midlength IFS, used by the centralized controller in the PCF scheme when issuing polls • DIFS (distributed coordination function IFS): The longest IFS, used as a minimum delay for asynchronous frames contending for access
  5. Consider first the SIFS. Any station using SIFS to determine transmission opportunity has, in effect, the highest priority, because it will always gain access in preference to a station waiting an amount of time equal to PIFS or DIFS. The SIFS is used in the following circumstances: • Acknowledgment (ACK): When a station receives a frame addressed only to itself (not multicast or broadcast), it responds with an ACK frame after waiting only for an SIFS gap. This has two desirable effects. First, because collision detection is not used, the likelihood of collisions is greater than with CSMA/CD, and the MAC-level ACK provides for efficient collision recovery. Second, the SIFS can be used to provide efficient delivery of an LLC protocol data unit (PDU) that requires multiple MAC frames. In this case, the following scenario occurs. A station with a multiframe LLC PDU to transmit sends out the MAC frames one at a time. Each frame is acknowledged by the recipient after SIFS. When the source receives an ACK, it immediately (after SIFS) sends the next frame in the sequence. The result is that once a station has contended for the channel, it will maintain control of the channel until it has sent all of the fragments of an LLC PDU. • Clear to Send (CTS): A station can ensure that its data frame will get through by first issuing a small Request to Send (RTS) frame. The station to which this frame is addressed should immediately respond with a CTS frame if it is ready to receive. All other stations receive the RTS and defer using the medium. • Poll response: This is explained in the following discussion of PCF.
  6. The next longest IFS interval is the PIFS. This is used by the centralized controller in issuing polls and takes precedence over normal contention traffic. However, those frames transmitted using SIFS have precedence over a PCF poll. Finally, the DIFS interval is used for all ordinary asynchronous traffic.
  7. Stallings DCC8e Figure 17.7a illustrates the use of these time values.
  8. Stallings DCC8e Figure 17.8 shows the 802.11 frame format. This general format is used for all data and control frames, but not all fields are used in all contexts. The fields are: • Frame Control: Indicates the type of frame (control, management, or data) and provides control information. Control information includes whether the frame is to or from a DS, fragmentation information, and privacy information. • Duration/Connection ID: If used as a duration field, indicates the time (in microseconds) the channel will be allocated for successful transmission of a MAC frame. In some control frames, this field contains an association, or connection, identifier. • Addresses: The number and meaning of the 48-bit address fields depend on context. The transmitter address and receiver address are the MAC addresses of stations joined to the BSS that are transmitting and receiving frames over the wireless LAN. The service set ID (SSID) identifies the wireless LAN over which a frame is transmitted. • Sequence Control: Contains a 4-bit fragment number subfield, used for fragmentation and reassembly, and a 12-bit sequence number used to number frames sent between a given transmitter and receiver. • Frame Body: Contains an MSDU or a fragment of an MSDU. The MSDU is a LLC protocol data unit or MAC control information. • Frame Check Sequence: A 32-bit cyclic redundancy check.