The document discusses medium access control (MAC) protocols for wireless local area networks (WLANs). It describes carrier sense multiple access with collision avoidance (CSMA/CA), which is used in WLANs because wireless nodes cannot detect collisions. The key aspects of CSMA/CA covered include backoff procedures, contention windows, and use of request-to-send and clear-to-send (RTS/CTS) frames to avoid the hidden and exposed terminal problems. Fragmentation is also discussed as a way to reduce retransmissions of long frames with errors.
The document discusses the IEEE 802.11 distributed coordination function (DCF) for media access control. It describes how DCF uses carrier sensing, random backoff times, and RTS/CTS handshaking to avoid collisions and solve the hidden terminal problem in an asynchronous and distributed manner. It also explains how DCF prioritizes transmission using short inter-frame spaces and provides reliability through acknowledgements. However, it notes DCF has disadvantages like high power consumption, not fully solving hidden terminals, and lack of support for multicast transmission.
Resolving data collision in csma via protocolsAnurag Singh
The document discusses resolving data collisions in CSMA wireless networks through various protocols. It describes the hidden and exposed station problems that can occur in CSMA networks and several research papers that propose solutions. The RTS-CTS handshake protocol is described as a way to avoid collisions between hidden terminals by having the sender and receiver exchange request-to-send and clear-to-send frames before transmitting data. Variants of this approach were incorporated into the IEEE 802.11 standard.
Wireless LAN technologies include WiFi (802.11 standards) and personal wireless networks like Bluetooth. 802.11 defines infrastructure networks with access points connected to wired networks, and ad-hoc networks without infrastructure. Key aspects of 802.11 include CSMA/CA for medium access, frame formats, and physical layer standards for radio (802.11a/b/g/n) and infrared transmission. Wireless networks offer mobility and flexibility compared to wired networks but have lower bandwidth and need to comply with regulations.
3. Introduction Wireless Local Area Networks.pptKp Sharma
Wireless LAN technologies include WiFi (802.11 standards) and personal wireless networks like Bluetooth. 802.11 defines infrastructure networks with access points connected to wired networks, and ad-hoc networks without infrastructure. Key aspects of 802.11 include CSMA/CA medium access, frame formats, and physical layer standards for radio frequencies (802.11a/b/g/n) and infrared (now obsolete). Wireless networks offer mobility and flexibility compared to wired networks but have lower bandwidth and can be affected by interference.
Chapter_03_Data Link Layer and its protocols.pptxmsohail37
This document provides a disclaimer statement for an educational presentation. It states that materials from various online sources such as books, websites, research papers and presentations were used to prepare the slides. However, the author does not intend to take credit for this work or infringe on any copyrights. The sources are acknowledged where applicable. The views expressed in the presentation belong solely to the presenter and do not necessarily represent the actual authors or institution.
The document discusses MAC layer protocols for wireless networks. It begins by explaining what MAC is and its role in controlling access to the transmission medium. It then discusses CSMA/CD, the MAC protocol used in Ethernet wired networks, and how it is not suitable for wireless due to the hidden terminal problem where collisions cannot be detected by the sender. The document introduces MACA and 802.11 DCF protocols which use RTS/CTS handshaking to avoid collisions for wireless transmissions. It describes the components of 802.11 DCF including carrier sensing, backoff procedures, and interframe spacing used between transmissions.
MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access to the physical transmission medium on a LAN.
It tries to ensure that no two nodes are interfering with each other’s transmissions, and deals with the situation when they do.
Distributed coordinate function: ad hoc mode
Virtual and physical carrier sense (CS)
Network allocation vector (NAV), duration field
Binary exponential backoff
RTS/CTS/DATA/ACK for unicast packets
Broadcast packets are directly sent after CS
Takes time for every node to increase CW
Especially if traffic is spatially-correlated and bursty
Waste backoff slots if collisions cause CW to increase
Now let’s look at how this works in practice.
B hears A’s transmission, so when B’s chosen slot comes, it continues to wait.
In CSMA, each node picks a timeslot uniformly at random in the contention window.
This means that every slot has an equal chance of being chosen by a node.
However, if someone else starts transmitting before your chosen slot, you need to remain quiet.
Therefore…
SIFS : used by ACK, CTS, poll response(short)
PIFS : used by PC (point coordinator) when issuing polls(point)
DIFS : used by ordinary asynchronous traffic(distributed)
SIFS - 16 µsec. Slot Time - 9 µsec. AIFS[0] = (2 * 9) + 16 = 34 µsec = DIFS. AIFS[1] = (4 * 9) + 16 = 52 µsec (52 – 34) / 9 = 18/9 = 2 Slots ...
slot: 9us. SIFS: 16us. PIFS: 25us. DIFS: 34us. AIFS: >=34us.
SIFS : Short Interframe Space. – PIFS : PCF Interframe Space. – DIFS : DCF Interframe Space. – AIFS : Arbitration Interframe Space (used for QoS)
AIFS = SIFS + AIFSN * aSlotTime.
AIFS[0] = PIFS + 1 µs; AIFS[1] = PIFS + 5µs; AIFS[2] = DIFS; therefore, AIFS[0] < AIFS[1] < AIFS[2]; where PIFS = SIFS + SLOT = 25 µs and DIFS =SIFS + 2*SLOT = 34 µs.
Contention-based protocols (contd.)
MACAW — improved over MACA
RTS/CTS/DATA/ACK
Fast error recovery at link layer
IEEE 802.11 Distributed Coordination Function (DCF)
Largely based on MACAW
Called CSMA/CA
A and C want to send to B
A sends RTS (Request To Send) to B
B sends CTS (Clear To Send) to AC “overhears” CTS from B
C waits for duration of A’s transmission
A and C want to send data to B
A senses medium idle and sends data
C senses medium idle and sends data
Collision occurs at B
Contention-based protocols
CSMA — Carrier Sense Multiple Access
Ethernet (CSMA/CD) is not enough for wireless (collision at receiver cannot detect at sender)Packets which suffered collisions should be re-sent.
Ideally, we would want all packets to be sent collision-free, only once…
Ethernet Collisions
Node A needs to transmit data to Node D.
Node A builds a packet.
Checks to see if the cable plant is clear (no one else is currently transmitting).
Transmits packet while listening to the cable.
Before Node A’s transmission reaches node C, node C accomplishes the above steps and also starts to transmit.
There is a collision on the cable plant caused by node A and C.
All stations invoke the backoff algorithm.
This defe
This document provides an introduction to the IEEE 802.11 wireless LAN standard. It outlines the standard's architecture including components like stations, basic service sets, extended service sets, and access points. It describes the medium access control sublayer which uses distributed coordination function and point coordination function to provide reliable data delivery and fair medium sharing. It also briefly discusses the physical layer and typical wireless LAN products.
The document discusses the IEEE 802.11 distributed coordination function (DCF) for media access control. It describes how DCF uses carrier sensing, random backoff times, and RTS/CTS handshaking to avoid collisions and solve the hidden terminal problem in an asynchronous and distributed manner. It also explains how DCF prioritizes transmission using short inter-frame spaces and provides reliability through acknowledgements. However, it notes DCF has disadvantages like high power consumption, not fully solving hidden terminals, and lack of support for multicast transmission.
Resolving data collision in csma via protocolsAnurag Singh
The document discusses resolving data collisions in CSMA wireless networks through various protocols. It describes the hidden and exposed station problems that can occur in CSMA networks and several research papers that propose solutions. The RTS-CTS handshake protocol is described as a way to avoid collisions between hidden terminals by having the sender and receiver exchange request-to-send and clear-to-send frames before transmitting data. Variants of this approach were incorporated into the IEEE 802.11 standard.
Wireless LAN technologies include WiFi (802.11 standards) and personal wireless networks like Bluetooth. 802.11 defines infrastructure networks with access points connected to wired networks, and ad-hoc networks without infrastructure. Key aspects of 802.11 include CSMA/CA for medium access, frame formats, and physical layer standards for radio (802.11a/b/g/n) and infrared transmission. Wireless networks offer mobility and flexibility compared to wired networks but have lower bandwidth and need to comply with regulations.
3. Introduction Wireless Local Area Networks.pptKp Sharma
Wireless LAN technologies include WiFi (802.11 standards) and personal wireless networks like Bluetooth. 802.11 defines infrastructure networks with access points connected to wired networks, and ad-hoc networks without infrastructure. Key aspects of 802.11 include CSMA/CA medium access, frame formats, and physical layer standards for radio frequencies (802.11a/b/g/n) and infrared (now obsolete). Wireless networks offer mobility and flexibility compared to wired networks but have lower bandwidth and can be affected by interference.
Chapter_03_Data Link Layer and its protocols.pptxmsohail37
This document provides a disclaimer statement for an educational presentation. It states that materials from various online sources such as books, websites, research papers and presentations were used to prepare the slides. However, the author does not intend to take credit for this work or infringe on any copyrights. The sources are acknowledged where applicable. The views expressed in the presentation belong solely to the presenter and do not necessarily represent the actual authors or institution.
The document discusses MAC layer protocols for wireless networks. It begins by explaining what MAC is and its role in controlling access to the transmission medium. It then discusses CSMA/CD, the MAC protocol used in Ethernet wired networks, and how it is not suitable for wireless due to the hidden terminal problem where collisions cannot be detected by the sender. The document introduces MACA and 802.11 DCF protocols which use RTS/CTS handshaking to avoid collisions for wireless transmissions. It describes the components of 802.11 DCF including carrier sensing, backoff procedures, and interframe spacing used between transmissions.
MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access to the physical transmission medium on a LAN.
It tries to ensure that no two nodes are interfering with each other’s transmissions, and deals with the situation when they do.
Distributed coordinate function: ad hoc mode
Virtual and physical carrier sense (CS)
Network allocation vector (NAV), duration field
Binary exponential backoff
RTS/CTS/DATA/ACK for unicast packets
Broadcast packets are directly sent after CS
Takes time for every node to increase CW
Especially if traffic is spatially-correlated and bursty
Waste backoff slots if collisions cause CW to increase
Now let’s look at how this works in practice.
B hears A’s transmission, so when B’s chosen slot comes, it continues to wait.
In CSMA, each node picks a timeslot uniformly at random in the contention window.
This means that every slot has an equal chance of being chosen by a node.
However, if someone else starts transmitting before your chosen slot, you need to remain quiet.
Therefore…
SIFS : used by ACK, CTS, poll response(short)
PIFS : used by PC (point coordinator) when issuing polls(point)
DIFS : used by ordinary asynchronous traffic(distributed)
SIFS - 16 µsec. Slot Time - 9 µsec. AIFS[0] = (2 * 9) + 16 = 34 µsec = DIFS. AIFS[1] = (4 * 9) + 16 = 52 µsec (52 – 34) / 9 = 18/9 = 2 Slots ...
slot: 9us. SIFS: 16us. PIFS: 25us. DIFS: 34us. AIFS: >=34us.
SIFS : Short Interframe Space. – PIFS : PCF Interframe Space. – DIFS : DCF Interframe Space. – AIFS : Arbitration Interframe Space (used for QoS)
AIFS = SIFS + AIFSN * aSlotTime.
AIFS[0] = PIFS + 1 µs; AIFS[1] = PIFS + 5µs; AIFS[2] = DIFS; therefore, AIFS[0] < AIFS[1] < AIFS[2]; where PIFS = SIFS + SLOT = 25 µs and DIFS =SIFS + 2*SLOT = 34 µs.
Contention-based protocols (contd.)
MACAW — improved over MACA
RTS/CTS/DATA/ACK
Fast error recovery at link layer
IEEE 802.11 Distributed Coordination Function (DCF)
Largely based on MACAW
Called CSMA/CA
A and C want to send to B
A sends RTS (Request To Send) to B
B sends CTS (Clear To Send) to AC “overhears” CTS from B
C waits for duration of A’s transmission
A and C want to send data to B
A senses medium idle and sends data
C senses medium idle and sends data
Collision occurs at B
Contention-based protocols
CSMA — Carrier Sense Multiple Access
Ethernet (CSMA/CD) is not enough for wireless (collision at receiver cannot detect at sender)Packets which suffered collisions should be re-sent.
Ideally, we would want all packets to be sent collision-free, only once…
Ethernet Collisions
Node A needs to transmit data to Node D.
Node A builds a packet.
Checks to see if the cable plant is clear (no one else is currently transmitting).
Transmits packet while listening to the cable.
Before Node A’s transmission reaches node C, node C accomplishes the above steps and also starts to transmit.
There is a collision on the cable plant caused by node A and C.
All stations invoke the backoff algorithm.
This defe
This document provides an introduction to the IEEE 802.11 wireless LAN standard. It outlines the standard's architecture including components like stations, basic service sets, extended service sets, and access points. It describes the medium access control sublayer which uses distributed coordination function and point coordination function to provide reliable data delivery and fair medium sharing. It also briefly discusses the physical layer and typical wireless LAN products.
1) Wireless networks developed in the 1990s with incompatible products until standardization by the IEEE 802 committee.
2) The IEEE 802 standards include 802.11 for wireless LANs which supports both infrastructure with access points and ad hoc networks without access points.
3) The 802.11 standard defines the physical and MAC layers including addressing problems like the hidden and exposed terminal problems through the use of CSMA/CA and RTS/CTS messaging.
This document discusses wireless medium access control (MAC) protocols. It provides an overview of MAC responsibilities and categorizes MAC protocols as contention-free, contention-based, or hybrid. It describes several MAC protocols including Carrier Sense Multiple Access (CSMA), MACA, IEEE 802.11, and IEEE 802.15.4/ZigBee. It discusses key characteristics for MAC protocols in wireless sensor networks including energy efficiency, scalability, adaptability, latency, reliability, and contrasts them with traditional network priorities like fairness.
UNIT II
WIRELESS NETWORKS
Wireless LAN – IEEE 802.11 Standards – Architecture – Services – Mobile Ad hoc Networks- WiFi and WiMAX - Wireless Local Loop
This document summarizes key concepts in wireless networking. It discusses challenges in the physical layer including signal attenuation and interference. It describes the CSMA/CA protocol used in wireless link layers and problems like hidden and exposed terminals. It also discusses modulation techniques, bit error rates, and variable bit rates in 802.11. Wireless routing poses additional challenges due to dynamic links, and hop count is not always the best metric since link quality varies significantly.
A wireless local area network (WLAN) uses radio frequency technology to transmit and receive data over the air, providing mobility and flexibility as an extension or alternative to wired networks. Key advantages of WLANs include productivity, convenience, lower installation costs and mobility. However, WLANs also have disadvantages such as higher costs for wireless network cards and access points, susceptibility to environmental interference, and lower bandwidth capacity compared to wired networks. Common applications of WLANs include use in corporate, education, medical and temporary settings.
The document summarizes MAC protocols for wireless mesh networks. It begins with an introduction to wireless mesh network architectures and important definitions. It then discusses single channel MAC protocols like S-MAC, T-MAC, and a new TDMA-based protocol. It also covers multi-channel MAC protocols classifications and examples like CC-MMAC and SSCH MAC. The document provides detailed explanations of the mechanisms and concepts behind various single and multi-channel MAC protocols.
The document provides an overview of the IEEE 802.11 protocol, describing its architecture, layers, and key mechanisms. The standard defines a cellular architecture with basic service sets (BSS) controlled by access points. It covers the MAC and physical layers, defining fragmentation/reassembly and carrier sense multiple access with collision avoidance (CSMA/CA) for medium access. Request to send/clear to send frames are used for virtual carrier sensing to reduce collisions between hidden stations.
The document discusses broadcast networks and medium access control (MAC) protocols. It introduces the concepts of broadcast networks, where a single shared medium allows all connected devices to receive messages. This leads to potential conflicts when multiple devices try to transmit simultaneously. MAC protocols are needed to coordinate transmissions and resolve conflicts. Common MAC protocols discussed include ALOHA, CSMA, CSMA/CD (Ethernet), and token passing (Token Ring). LAN standards like IEEE 802.3 that define MAC sublayer functions for CSMA/CD networks are also summarized briefly.
The document discusses various aspects of the data link layer, including:
1. The data link layer provides a well-defined interface to the network layer, deals with transmission errors, regulates frame flow, and performs link management.
2. It determines how bits are grouped into frames, applies techniques like CRC for error detection and ARQ for error recovery.
3. Sliding window protocols allow simultaneous transmission of data in both directions using sequence numbers and acknowledgments to regulate flow, prevent ambiguity, and ensure reliable delivery.
Data Link Layer of OSI Model responsibilitiesHemantPareek21
The document discusses various aspects of the data link layer, including:
1. The data link layer provides a well-defined interface to the network layer, deals with transmission errors, regulates frame flow, and performs link management.
2. It determines how bits are grouped into frames, applies techniques like CRC for error detection and ARQ for error recovery.
3. Sliding window protocols allow simultaneous transmission of data in both directions using sequence numbers and acknowledgments to regulate flow, prevent ambiguity, and ensure reliable delivery.
- Data link control protocols provide logical functions above the physical layer to manage data exchange over a link, including frame synchronization, flow control, error control, addressing, and link management.
- Stop-and-wait and sliding window protocols are commonly used for flow control, with sliding window protocols allowing multiple frames to be transmitted to improve link utilization.
- Automatic repeat request (ARQ) techniques like stop-and-wait, go-back-N, and selective reject are used for error control, detecting errors and retransmitting damaged or lost frames.
Provide a full explanation to the below question.1. Summarize the .pdfarihantmobileselepun
Provide a full explanation to the below question.
1. Summarize the 802.11 standard and describe the various flavors of the standard, its
architecture and how the standard is contributing to easing of congestion in cellular networks.
Solution
IEEE 802.11 is a standard that defines the physical and MAC layers of Wireless Local Area
Network (WLAN). Under this standard, the Mobile terminals (MTs) can communicate with a
Access Point (AP) in two modes. First mode is the Infrastructure Mode, in which the MTs
communicate with the APs which forward their data to the WLAN. Second mode is the Adhoc
mode, in which the MTs communicate directly with each other without the use of a AP. The
IEEE 802.11 has a very robust Medium Access Control (MAC) mechanism that helps in
alleviating te congestion in the LANs. The inherent working of MAC protocol employed by
802.11 standard is same as that of Carrier Sense Multiple Access/ Collision Aviodance
(CSMA/CA). However, in IEEE 802.11 the protocol is implemented in two different ways. First
way is called as the Distributed Coordination Function based Wireless MAC (DCFWMAC), and
the second way is Point Coordination Function based Wireless MAC (PCFWMAC).
In the DCFWMAC, every node tries to access the medium based on some fixed duration of time
defined in the standard. Normally there are three such time intervals defined based on which a
node attempts to access the channel and transmit its packets. The first interval is the Short Inter
frame Spacing (SIFS). It is the smallest duration of time between two frames and gives the node
higher priority for sending its data. Such a interval is employed only when the node has correctly
sent its data through the channel and the receiver node needs to send a Acknowlegement (ACK)
after waiting for SIFS period of time. The second most priority interval is PCF Inter Frame
Spacing (PIFS) used during Polling mechanism by the AP. Its duration is between SIFS and
DCF Inter frame Spacing (DIFS). The DIFS is the longest time duration and hence of least
priority, in which a AP has to wait between two successive channel accesses for the given
duration. Once the channel is sensed idle, the AP waits for DIFS period of time to transmit data
through the channel. If the channel is sensed busy, then it backs off for a period of time based on
the minimum and maximum value of a contention window. During the back off period, if the
node senses the channel as busy, then it freezes the backoff counter and starts the backoff(with
the remaining time left) once the channel is idle. In this manner, the nodes which have waited
longer get higher priority over others which accessing the channel. Once the node sends the data
after accessing the channel, the receiver waits for SIFS duration of time to finally send the
acknowledgement to the sender. In order to tackle the hidden terminal problem, the DCFWMAC
employs an additional mechanism called as the RTS-CTS mechanism, in which any node that
wants to transmit.
The document discusses several topics related to reliable data transmission over physical networks:
1) Encoding techniques like NRZ, Manchester, and 4B/5B encode binary data onto signals to transmit over networks and solve issues like consecutive 1s/0s.
2) Framing breaks the bit stream into frames using techniques like sentinel bits, counters, or clock timing.
3) Error detection codes like parity checks, checksums, and cyclic redundancy checks (CRCs) detect errors by adding redundant bits and checking values at the receiver.
The document discusses data link control and framing in computer networks. It describes two main functions of the data link layer: defining frames and performing error detection on frames. It also discusses different types of framing such as fixed-size framing and variable-size framing using character-oriented and bit-oriented protocols. Specific protocols discussed include Stop-and-Wait ARQ which uses positive acknowledgments and retransmissions, and Go-Back-N ARQ which allows for pipelining of multiple frames before requiring an acknowledgment.
The document discusses MAC layer protocols for wireless networks. It begins by explaining that MAC (Media Access Control) controls access to the shared transmission medium on a local area network. It aims to prevent nodes from interfering with each other's transmissions. Common MAC protocols discussed include CSMA/CD used in Ethernet, and early wireless MAC protocols like MACA which introduced RTS/CTS to avoid the hidden terminal problem. A key part of wireless MAC is the IEEE 802.11 distributed coordination function, which uses carrier sensing, backoff mechanisms and RTS/CTS/DATA/ACK to allow multiple nodes fair access to the shared wireless channel.
This document summarizes the medium access control (MAC) sublayer. It discusses functions like carrier sensing, collision detection, and dynamic channel allocation protocols. It provides details on MAC protocols including ALOHA, CSMA, CSMA/CD (Ethernet), switched Ethernet, and wireless LANs. The key technologies and frame structures are explained for each protocol.
MEDIUM ACCESS CONTROL Sublayer IN CN.pptssuser35e92d
The document discusses the medium access control (MAC) sublayer and various MAC protocols. It begins by explaining the channel allocation problem and describing static and dynamic channel allocation technologies. It then provides details on several dynamic channel allocation protocols including ALOHA, CSMA, CSMA/CD (Ethernet), switched Ethernet, and wireless LANs. For each protocol, it describes key aspects such as how they determine when a node can transmit, use of carrier sensing, collision detection and resolution, and frame structure. The goal of the MAC sublayer is to efficiently share access to the transmission medium among multiple nodes.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
1) Wireless networks developed in the 1990s with incompatible products until standardization by the IEEE 802 committee.
2) The IEEE 802 standards include 802.11 for wireless LANs which supports both infrastructure with access points and ad hoc networks without access points.
3) The 802.11 standard defines the physical and MAC layers including addressing problems like the hidden and exposed terminal problems through the use of CSMA/CA and RTS/CTS messaging.
This document discusses wireless medium access control (MAC) protocols. It provides an overview of MAC responsibilities and categorizes MAC protocols as contention-free, contention-based, or hybrid. It describes several MAC protocols including Carrier Sense Multiple Access (CSMA), MACA, IEEE 802.11, and IEEE 802.15.4/ZigBee. It discusses key characteristics for MAC protocols in wireless sensor networks including energy efficiency, scalability, adaptability, latency, reliability, and contrasts them with traditional network priorities like fairness.
UNIT II
WIRELESS NETWORKS
Wireless LAN – IEEE 802.11 Standards – Architecture – Services – Mobile Ad hoc Networks- WiFi and WiMAX - Wireless Local Loop
This document summarizes key concepts in wireless networking. It discusses challenges in the physical layer including signal attenuation and interference. It describes the CSMA/CA protocol used in wireless link layers and problems like hidden and exposed terminals. It also discusses modulation techniques, bit error rates, and variable bit rates in 802.11. Wireless routing poses additional challenges due to dynamic links, and hop count is not always the best metric since link quality varies significantly.
A wireless local area network (WLAN) uses radio frequency technology to transmit and receive data over the air, providing mobility and flexibility as an extension or alternative to wired networks. Key advantages of WLANs include productivity, convenience, lower installation costs and mobility. However, WLANs also have disadvantages such as higher costs for wireless network cards and access points, susceptibility to environmental interference, and lower bandwidth capacity compared to wired networks. Common applications of WLANs include use in corporate, education, medical and temporary settings.
The document summarizes MAC protocols for wireless mesh networks. It begins with an introduction to wireless mesh network architectures and important definitions. It then discusses single channel MAC protocols like S-MAC, T-MAC, and a new TDMA-based protocol. It also covers multi-channel MAC protocols classifications and examples like CC-MMAC and SSCH MAC. The document provides detailed explanations of the mechanisms and concepts behind various single and multi-channel MAC protocols.
The document provides an overview of the IEEE 802.11 protocol, describing its architecture, layers, and key mechanisms. The standard defines a cellular architecture with basic service sets (BSS) controlled by access points. It covers the MAC and physical layers, defining fragmentation/reassembly and carrier sense multiple access with collision avoidance (CSMA/CA) for medium access. Request to send/clear to send frames are used for virtual carrier sensing to reduce collisions between hidden stations.
The document discusses broadcast networks and medium access control (MAC) protocols. It introduces the concepts of broadcast networks, where a single shared medium allows all connected devices to receive messages. This leads to potential conflicts when multiple devices try to transmit simultaneously. MAC protocols are needed to coordinate transmissions and resolve conflicts. Common MAC protocols discussed include ALOHA, CSMA, CSMA/CD (Ethernet), and token passing (Token Ring). LAN standards like IEEE 802.3 that define MAC sublayer functions for CSMA/CD networks are also summarized briefly.
The document discusses various aspects of the data link layer, including:
1. The data link layer provides a well-defined interface to the network layer, deals with transmission errors, regulates frame flow, and performs link management.
2. It determines how bits are grouped into frames, applies techniques like CRC for error detection and ARQ for error recovery.
3. Sliding window protocols allow simultaneous transmission of data in both directions using sequence numbers and acknowledgments to regulate flow, prevent ambiguity, and ensure reliable delivery.
Data Link Layer of OSI Model responsibilitiesHemantPareek21
The document discusses various aspects of the data link layer, including:
1. The data link layer provides a well-defined interface to the network layer, deals with transmission errors, regulates frame flow, and performs link management.
2. It determines how bits are grouped into frames, applies techniques like CRC for error detection and ARQ for error recovery.
3. Sliding window protocols allow simultaneous transmission of data in both directions using sequence numbers and acknowledgments to regulate flow, prevent ambiguity, and ensure reliable delivery.
- Data link control protocols provide logical functions above the physical layer to manage data exchange over a link, including frame synchronization, flow control, error control, addressing, and link management.
- Stop-and-wait and sliding window protocols are commonly used for flow control, with sliding window protocols allowing multiple frames to be transmitted to improve link utilization.
- Automatic repeat request (ARQ) techniques like stop-and-wait, go-back-N, and selective reject are used for error control, detecting errors and retransmitting damaged or lost frames.
Provide a full explanation to the below question.1. Summarize the .pdfarihantmobileselepun
Provide a full explanation to the below question.
1. Summarize the 802.11 standard and describe the various flavors of the standard, its
architecture and how the standard is contributing to easing of congestion in cellular networks.
Solution
IEEE 802.11 is a standard that defines the physical and MAC layers of Wireless Local Area
Network (WLAN). Under this standard, the Mobile terminals (MTs) can communicate with a
Access Point (AP) in two modes. First mode is the Infrastructure Mode, in which the MTs
communicate with the APs which forward their data to the WLAN. Second mode is the Adhoc
mode, in which the MTs communicate directly with each other without the use of a AP. The
IEEE 802.11 has a very robust Medium Access Control (MAC) mechanism that helps in
alleviating te congestion in the LANs. The inherent working of MAC protocol employed by
802.11 standard is same as that of Carrier Sense Multiple Access/ Collision Aviodance
(CSMA/CA). However, in IEEE 802.11 the protocol is implemented in two different ways. First
way is called as the Distributed Coordination Function based Wireless MAC (DCFWMAC), and
the second way is Point Coordination Function based Wireless MAC (PCFWMAC).
In the DCFWMAC, every node tries to access the medium based on some fixed duration of time
defined in the standard. Normally there are three such time intervals defined based on which a
node attempts to access the channel and transmit its packets. The first interval is the Short Inter
frame Spacing (SIFS). It is the smallest duration of time between two frames and gives the node
higher priority for sending its data. Such a interval is employed only when the node has correctly
sent its data through the channel and the receiver node needs to send a Acknowlegement (ACK)
after waiting for SIFS period of time. The second most priority interval is PCF Inter Frame
Spacing (PIFS) used during Polling mechanism by the AP. Its duration is between SIFS and
DCF Inter frame Spacing (DIFS). The DIFS is the longest time duration and hence of least
priority, in which a AP has to wait between two successive channel accesses for the given
duration. Once the channel is sensed idle, the AP waits for DIFS period of time to transmit data
through the channel. If the channel is sensed busy, then it backs off for a period of time based on
the minimum and maximum value of a contention window. During the back off period, if the
node senses the channel as busy, then it freezes the backoff counter and starts the backoff(with
the remaining time left) once the channel is idle. In this manner, the nodes which have waited
longer get higher priority over others which accessing the channel. Once the node sends the data
after accessing the channel, the receiver waits for SIFS duration of time to finally send the
acknowledgement to the sender. In order to tackle the hidden terminal problem, the DCFWMAC
employs an additional mechanism called as the RTS-CTS mechanism, in which any node that
wants to transmit.
The document discusses several topics related to reliable data transmission over physical networks:
1) Encoding techniques like NRZ, Manchester, and 4B/5B encode binary data onto signals to transmit over networks and solve issues like consecutive 1s/0s.
2) Framing breaks the bit stream into frames using techniques like sentinel bits, counters, or clock timing.
3) Error detection codes like parity checks, checksums, and cyclic redundancy checks (CRCs) detect errors by adding redundant bits and checking values at the receiver.
The document discusses data link control and framing in computer networks. It describes two main functions of the data link layer: defining frames and performing error detection on frames. It also discusses different types of framing such as fixed-size framing and variable-size framing using character-oriented and bit-oriented protocols. Specific protocols discussed include Stop-and-Wait ARQ which uses positive acknowledgments and retransmissions, and Go-Back-N ARQ which allows for pipelining of multiple frames before requiring an acknowledgment.
The document discusses MAC layer protocols for wireless networks. It begins by explaining that MAC (Media Access Control) controls access to the shared transmission medium on a local area network. It aims to prevent nodes from interfering with each other's transmissions. Common MAC protocols discussed include CSMA/CD used in Ethernet, and early wireless MAC protocols like MACA which introduced RTS/CTS to avoid the hidden terminal problem. A key part of wireless MAC is the IEEE 802.11 distributed coordination function, which uses carrier sensing, backoff mechanisms and RTS/CTS/DATA/ACK to allow multiple nodes fair access to the shared wireless channel.
This document summarizes the medium access control (MAC) sublayer. It discusses functions like carrier sensing, collision detection, and dynamic channel allocation protocols. It provides details on MAC protocols including ALOHA, CSMA, CSMA/CD (Ethernet), switched Ethernet, and wireless LANs. The key technologies and frame structures are explained for each protocol.
MEDIUM ACCESS CONTROL Sublayer IN CN.pptssuser35e92d
The document discusses the medium access control (MAC) sublayer and various MAC protocols. It begins by explaining the channel allocation problem and describing static and dynamic channel allocation technologies. It then provides details on several dynamic channel allocation protocols including ALOHA, CSMA, CSMA/CD (Ethernet), switched Ethernet, and wireless LANs. For each protocol, it describes key aspects such as how they determine when a node can transmit, use of carrier sensing, collision detection and resolution, and frame structure. The goal of the MAC sublayer is to efficiently share access to the transmission medium among multiple nodes.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
4. WLAN, part 2
Wireless Innovative Transmission Lab 4
Medium Access Control (MAC)
LLC
MAC
PHY
:
Medium access control: Different nodes must gain access
to the shared medium (for instance a wireless channel) in
a controlled fashion (otherwise there will be collisions).
FDMA
TDMA
CDMA
CSMA
Assigning channels in frequency domain
Assigning time slots in time domain
Assigning code sequences in code domain
Assigning transmission opportunities in
time domain on a statistical basis
(Randomly chosen numbers)
Access methods:
5. WLAN, part 2
Wireless Innovative Transmission Lab 5
CSMA/CD vs. CSMA/CA (1)
CSMA/CD (Collision Detection) is the MAC method used in
a wired LAN (Ethernet). Wired LAN stations can (whereas
wireless stations cannot) detect collisions.
Basic CSMA/CD operation:
1) Wait for free medium
2) Transmit frame
3) If collision, stop transmission immediately
4) Retransmit after random time (backoff)
CSMA/CD rule:
Backoff after collision
7. WLAN, part 2
Wireless Innovative Transmission Lab 7
CSMA/CD vs. CSMA/CA (2)
CSMA/CA (Collision Avoidance) is the MAC method used in
a wireless LAN. Wireless stations cannot detect collisions
(i.e. the whole packets will be transmitted anyway).
Basic CSMA/CA operation:
1) Wait for free medium
2) Wait a random time (backoff)
3) Transmit frame
4) If collision, the stations do not notice it
5) Collision => erroneous frame => no ACK returned
CSMA/CA rule:
Backoff before
collision
9. WLAN, part 2
Wireless Innovative Transmission Lab 9
Basic wireless medium access
AP
transmission in downlink
(from the AP)
and
transmission in uplink
(from a station)
CSMA:
One packet at a time
wired
LAN
10. WLAN, part 2
Wireless Innovative Transmission Lab 10
Wireless medium access (1)
DIFS SIFS
ACK
(B=>A)
Transmitted
frame
(A=>B)
When a frame is received without bit errors, the receiving
station (B) sends an Acknowledgement (ACK) frame back
to the transmitting station (A).
If the received frame
is erroneous, no ACK
will be sent
11. WLAN, part 2
Wireless Innovative Transmission Lab 11
Wireless medium access (2)
DIFS SIFS DIFS
ACK
(B=>A)
Transmitted
frame
(A=>B)
During the transmission sequence (Frame + SIFS + ACK)
the medium (radio channel) is reserved. The next frame
can be transmitted at earliest after the next DIFS period.
Next frame
(from any station)
Earliest allowed
transmission time
of next frame
12. WLAN, part 2
Wireless Innovative Transmission Lab 12
Wireless medium access (5)
The two most important interframe spacing times are
SIFS and DIFS:
SIFS (Short Interframe Space) = 10 µs (16 µs)
DIFS (DCF Interframe Space) = 50 µs (34 µs)
When two stations try to access the medium at the
same time, the one that has to wait for the time SIFS
wins over the one that has to wait for the time DIFS.
In other words, SIFS has higher priority over DIFS.
802.11b 802.11g
13. WLAN, part 2
Wireless Innovative Transmission Lab 13
Wireless medium access (8)
DIFS SIFS t > DIFS
ACK
(B=>A)
Transmitted
frame
(A=>B)
When a station wants to send a frame and the channel has
been idle for a time > DIFS (counted from the moment the
station first probed the channel) => can send immediately.
Next frame
(from any station)
Channel was idle at
least DIFS seconds
14. WLAN, part 2
Wireless Innovative Transmission Lab 14
Wireless medium access (9)
DIFS SIFS DIFS
ACK
(B=>A)
Transmitted
frame
(A=>B)
When a station wants to send a frame and the channel is
busy => the station must wait a backoff time before it is
allowed to transmit the frame. Reason? Next two slides…
Next
frame
Channel was busy
when station wanted
to send frame
Backoff
15. WLAN, part 2
Wireless Innovative Transmission Lab 15
No backoff => collision is certain
Suppose that several stations (B and C in the figure) are
waiting to access the wireless medium.
When the channel becomes idle, these stations start
sending their packets at the same time => collision!
Station A
Station B
Station C
DIFS
Collision!
ACK
16. WLAN, part 2
Wireless Innovative Transmission Lab 16
Backoff => collision probability is reduced
Contending stations generate random backoff values bn.
Backoff counters count downwards, starting from bn.
When a counter reaches zero, the station is allowed to
send its frame. All other counters stop counting until the
channel becomes idle again.
Station A
Station B
Station C
DIFS
bn is large
bn is small
Backoff
Remaining
backoff time
ACK
17. WLAN, part 2
Wireless Innovative Transmission Lab 17
Contention window (CW) for 802.11b
If transmission of a frame was unsuccessful and the frame
is allowed to be retransmitted, before each retransmission
the Contention Window (CW) from which bn is chosen is
increased.
DIFS
… CW = 25-1 = 31 slots
(slot = 20 µs)
Initial attempt
DIFS
…
CW = 26-1 = 63 slots
1st retransm.
DIFS
CW = 210-1
= 1023 slots
5th (and further)
retransmissions
:
…
CW
802.11b
18. WLAN, part 2
Wireless Innovative Transmission Lab 18
Contention window (CW) for 802.11g
In the case of 802.11g operation, the initial CW length is
15 slots. The slot duration is 9 µs. The backoff operation
of 802.11g is substantially faster than that of 802.11b.
DIFS
… CW = 24-1 = 15 slots
(slot = 9 µs)
Initial attempt
DIFS
…
CW = 25-1 = 31 slots
1st retransm.
DIFS
CW = 210-1
= 1023 slots
6th (and further)
retransmissions
:
…
CW
802.11g
19. WLAN, part 2
Wireless Innovative Transmission Lab 19
No shortcuts for any station…
DIFS SIFS DIFS
ACK
(B=>A)
Transmitted
frame
(A=>B)
Next
frame
(A=>B)
Backoff
When a station wants to send more than one frame, it has
to use the backoff mechanism like any other station (of
course it can ”capture” the channel by sending a long
frame, for instance using fragmentation).
20. WLAN, part 2
Wireless Innovative Transmission Lab 20
Hidden Terminal Problem
A
B
X
carrier not free ≠ OK to transmit
21. WLAN, part 2
Wireless Innovative Transmission Lab 21
Usage of RTS & CTS
The RTS/CTS (Request/Clear To Send) scheme is used as
a countermeasure against the “hidden node” problem:
AP
WS 1
WS 2
Hidden node problem:
WS 1 and WS 2 can ”hear”
the AP but not each other
=>
If WS 1 sends a packet, WS 2 does not
notice this (and vice versa) => collision!
22. WLAN, part 2
Wireless Innovative Transmission Lab 22
Reservation of medium using NAV
The RTS/CTS scheme makes use of “SIFS-only” and the
NAV (Network Allocation Vector) to reserve the medium:
RTS
SIFS
DIFS
NAV = CTS + Data + ACK + 3xSIFS
CTS
Data frame
ACK
SIFS
SIFS
WS 1
AP
NAV = Data + ACK + 2xSIFS
NAV in RTS
NAV in CTS
24. WLAN, part 2
Wireless Innovative Transmission Lab 24
Danger of collision only during RTS
WS 2 does not hear the RTS frame (and associated NAV),
but can hear the CTS frame (and associated NAV).
RTS
NAV = CTS + Data + ACK + 3xSIFS
CTS
Data frame
ACK
WS 1
AP
NAV = Data + ACK + 3xSIFS
NAV in RTS
NAV in CTS
Danger of collision
27. WLAN, part 2
Wireless Innovative Transmission Lab 27
Advantage of RTS & CTS (1)
Usage of RTS/CTS offers an advantage if the data frame
is very long compared to the RTS frame:
RTS
CTS
Data frame
ACK
WS 1
AP
Short interval: collision not likely
Data frame
ACK
WS 1
AP
Long interval: collision likely
(RTS/CTS not used)
(RTS/CTS used)
28. WLAN, part 2
Wireless Innovative Transmission Lab 28
Advantage of RTS & CTS (2)
A long “collision danger” interval (previous slide) should
be avoided for the following reasons:
Larger probability of collision
Greater waste of capacity if a collision occurs and the
frame has to be retransmitted.
A threshold parameter (IEEE 802.11 frame~Threshold)
can be set in the wireless station. Frames shorter than
this value will be transmitted without using RTS/CTS.
29. WLAN, part 2
Wireless Innovative Transmission Lab 29
Fragmentation
Fragmentation makes use of the RTS/CTS scheme and the
NAV mechanism:
RTS
SIFS
DIFS
RTS
CTS
Frag 0
ACK 0
SIFS
SIFS
WS 1
AP
CTS
NAV in WS
NAV in AP
Frag 1
ACK 1
SIFS
SIFS
Frag 0
ACK 0
30. WLAN, part 2
Wireless Innovative Transmission Lab 30
Advantage of fragmentation
Transmitting long data frames should be avoided for the
following reasons:
Larger probability that the frame is erroneous
Greater waste of capacity if a frame error occurs and
the whole frame has to be retransmitted.
A threshold parameter (dot11FragmentationThreshold)
can be set in the wireless station. Frames longer than
this value will be transmitted using fragmentation.
31. WLAN, part 2
Wireless Innovative Transmission Lab 31
WBAN CSMA/CA
Transmitting long data frames should be avoided for the
following reasons:
Larger probability that the frame is erroneous
Greater waste of capacity if a frame error occurs and
the whole frame has to be retransmitted.
A threshold parameter (dot11FragmentationThreshold)
can be set in the wireless station. Frames longer than
this value will be transmitted using fragmentation.
32. WLAN, part 2
Wireless Innovative Transmission Lab 32
B
MAP1 MAP2
EAP1 RAP1 EAP2 RAP2 CAP
Beacon period (superframe) n
B2
7
UP
CSMA/Slotted
Aloha
7
UP
CSMA/Slotted
Aloha
s
All UP
CSMA/Slotted
Aloha Polling Mechanisms
s
All UP
CSMA/Slotted
Aloha
s
All UP
CSMA/Slotted
Aloha
Polling Mechanisms
WBAN
33. WLAN, part 2
Wireless Innovative Transmission Lab 33
Start
Channel is
Busy?
BC = BC-1
BC=0?
Transmit Packet and
Wait for ACK
ACK received
within timeout
period?
Freeze the BC
node has a
packet to
transmit
UPi
Y
Y
N
N
N
Y
N
j=j+1
CW CW
i,j i,max
>
Backoff Counter
(BC)=rand (1,CW )
,min
i
Y
N
BC=rand (1,CW )
i,j
BC=rand (1,CW )
i,max
Collision Counter
j=0
New CW Size;
j
2
CW =2 CW
i,j i,min
WBAN CSMA/CA
(Flowchart)
34. WLAN, part 2
Wireless Innovative Transmission Lab 34
Start
Current time is
outside of suitable
access phase?
Channel is
Busy?
No enough time left
in the suitable access
phase(s) to transmit
the packet?
BC = BC-1
BC=0?
Transmit Packet and
Wait for ACK
ACK received
within timeout
period?
Freeze the BC
node has a
packet to
transmit
UPi
Y
Y
Y
N
N
N
N
Y
Y
N
j=j+1
CW CW
i,j i,max
>
Backoff Counter
(BC)=rand (1,CW )
,min
i
Y
N
BC=rand (1,CW )
i,j
BC=rand (1,CW )
i,max
Collision Counter
j=0
New CW Size;
j
2
CW =2 CW
i,j i,min
End
WBAN CSMA/CA
Flowchart for all the
access phases