SlideShare a Scribd company logo
WLAN, part 2
Wireless Innovative Transmission Lab 1
Contents
IEEE 802.11 MAC layer operation
• Basic CSMA/CA operation
• Network Allocation Vector (NAV)
• Backoff operation
• Wireless medium access example
Usage of RTS / CTS
WLAN, part 2
Wireless Innovative Transmission Lab 2
WLAN, part 2
Wireless Innovative Transmission Lab 3
WLAN, part 2
Wireless Innovative Transmission Lab 4
Medium Access Control (MAC)
LLC
MAC
PHY
:
Medium access control: Different nodes must gain access
to the shared medium (for instance a wireless channel) in
a controlled fashion (otherwise there will be collisions).
FDMA
TDMA
CDMA
CSMA
Assigning channels in frequency domain
Assigning time slots in time domain
Assigning code sequences in code domain
Assigning transmission opportunities in
time domain on a statistical basis
(Randomly chosen numbers)
Access methods:
WLAN, part 2
Wireless Innovative Transmission Lab 5
CSMA/CD vs. CSMA/CA (1)
CSMA/CD (Collision Detection) is the MAC method used in
a wired LAN (Ethernet). Wired LAN stations can (whereas
wireless stations cannot) detect collisions.
Basic CSMA/CD operation:
1) Wait for free medium
2) Transmit frame
3) If collision, stop transmission immediately
4) Retransmit after random time (backoff)
CSMA/CD rule:
Backoff after collision
WLAN, part 2
Wireless Innovative Transmission Lab 6
CSMA/CD
(Flowchart)
WLAN, part 2
Wireless Innovative Transmission Lab 7
CSMA/CD vs. CSMA/CA (2)
CSMA/CA (Collision Avoidance) is the MAC method used in
a wireless LAN. Wireless stations cannot detect collisions
(i.e. the whole packets will be transmitted anyway).
Basic CSMA/CA operation:
1) Wait for free medium
2) Wait a random time (backoff)
3) Transmit frame
4) If collision, the stations do not notice it
5) Collision => erroneous frame => no ACK returned
CSMA/CA rule:
Backoff before
collision
WLAN, part 2
Wireless Innovative Transmission Lab 8
CSMA/CA
(Flowchart)
WLAN, part 2
Wireless Innovative Transmission Lab 9
Basic wireless medium access
AP
transmission in downlink
(from the AP)
and
transmission in uplink
(from a station)
CSMA:
One packet at a time
wired
LAN
WLAN, part 2
Wireless Innovative Transmission Lab 10
Wireless medium access (1)
DIFS SIFS
ACK
(B=>A)
Transmitted
frame
(A=>B)
When a frame is received without bit errors, the receiving
station (B) sends an Acknowledgement (ACK) frame back
to the transmitting station (A).
If the received frame
is erroneous, no ACK
will be sent
WLAN, part 2
Wireless Innovative Transmission Lab 11
Wireless medium access (2)
DIFS SIFS DIFS
ACK
(B=>A)
Transmitted
frame
(A=>B)
During the transmission sequence (Frame + SIFS + ACK)
the medium (radio channel) is reserved. The next frame
can be transmitted at earliest after the next DIFS period.
Next frame
(from any station)
Earliest allowed
transmission time
of next frame
WLAN, part 2
Wireless Innovative Transmission Lab 12
Wireless medium access (5)
The two most important interframe spacing times are
SIFS and DIFS:
SIFS (Short Interframe Space) = 10 µs (16 µs)
DIFS (DCF Interframe Space) = 50 µs (34 µs)
When two stations try to access the medium at the
same time, the one that has to wait for the time SIFS
wins over the one that has to wait for the time DIFS.
In other words, SIFS has higher priority over DIFS.
802.11b 802.11g
WLAN, part 2
Wireless Innovative Transmission Lab 13
Wireless medium access (8)
DIFS SIFS t > DIFS
ACK
(B=>A)
Transmitted
frame
(A=>B)
When a station wants to send a frame and the channel has
been idle for a time > DIFS (counted from the moment the
station first probed the channel) => can send immediately.
Next frame
(from any station)
Channel was idle at
least DIFS seconds
WLAN, part 2
Wireless Innovative Transmission Lab 14
Wireless medium access (9)
DIFS SIFS DIFS
ACK
(B=>A)
Transmitted
frame
(A=>B)
When a station wants to send a frame and the channel is
busy => the station must wait a backoff time before it is
allowed to transmit the frame. Reason? Next two slides…
Next
frame
Channel was busy
when station wanted
to send frame
Backoff
WLAN, part 2
Wireless Innovative Transmission Lab 15
No backoff => collision is certain
Suppose that several stations (B and C in the figure) are
waiting to access the wireless medium.
When the channel becomes idle, these stations start
sending their packets at the same time => collision!
Station A
Station B
Station C
DIFS
Collision!
ACK
WLAN, part 2
Wireless Innovative Transmission Lab 16
Backoff => collision probability is reduced
Contending stations generate random backoff values bn.
Backoff counters count downwards, starting from bn.
When a counter reaches zero, the station is allowed to
send its frame. All other counters stop counting until the
channel becomes idle again.
Station A
Station B
Station C
DIFS
bn is large
bn is small
Backoff
Remaining
backoff time
ACK
WLAN, part 2
Wireless Innovative Transmission Lab 17
Contention window (CW) for 802.11b
If transmission of a frame was unsuccessful and the frame
is allowed to be retransmitted, before each retransmission
the Contention Window (CW) from which bn is chosen is
increased.
DIFS
… CW = 25-1 = 31 slots
(slot = 20 µs)
Initial attempt
DIFS
…
CW = 26-1 = 63 slots
1st retransm.
DIFS
CW = 210-1
= 1023 slots
5th (and further)
retransmissions
:
…
CW
802.11b
WLAN, part 2
Wireless Innovative Transmission Lab 18
Contention window (CW) for 802.11g
In the case of 802.11g operation, the initial CW length is
15 slots. The slot duration is 9 µs. The backoff operation
of 802.11g is substantially faster than that of 802.11b.
DIFS
… CW = 24-1 = 15 slots
(slot = 9 µs)
Initial attempt
DIFS
…
CW = 25-1 = 31 slots
1st retransm.
DIFS
CW = 210-1
= 1023 slots
6th (and further)
retransmissions
:
…
CW
802.11g
WLAN, part 2
Wireless Innovative Transmission Lab 19
No shortcuts for any station…
DIFS SIFS DIFS
ACK
(B=>A)
Transmitted
frame
(A=>B)
Next
frame
(A=>B)
Backoff
When a station wants to send more than one frame, it has
to use the backoff mechanism like any other station (of
course it can ”capture” the channel by sending a long
frame, for instance using fragmentation).
WLAN, part 2
Wireless Innovative Transmission Lab 20
Hidden Terminal Problem
A
B
X
carrier not free ≠ OK to transmit
WLAN, part 2
Wireless Innovative Transmission Lab 21
Usage of RTS & CTS
The RTS/CTS (Request/Clear To Send) scheme is used as
a countermeasure against the “hidden node” problem:
AP
WS 1
WS 2
Hidden node problem:
WS 1 and WS 2 can ”hear”
the AP but not each other
=>
If WS 1 sends a packet, WS 2 does not
notice this (and vice versa) => collision!
WLAN, part 2
Wireless Innovative Transmission Lab 22
Reservation of medium using NAV
The RTS/CTS scheme makes use of “SIFS-only” and the
NAV (Network Allocation Vector) to reserve the medium:
RTS
SIFS
DIFS
NAV = CTS + Data + ACK + 3xSIFS
CTS
Data frame
ACK
SIFS
SIFS
WS 1
AP
NAV = Data + ACK + 2xSIFS
NAV in RTS
NAV in CTS
WLAN, part 2
Wireless Innovative Transmission Lab 23
CSMA/CA and NAV
WLAN, part 2
Wireless Innovative Transmission Lab 24
Danger of collision only during RTS
WS 2 does not hear the RTS frame (and associated NAV),
but can hear the CTS frame (and associated NAV).
RTS
NAV = CTS + Data + ACK + 3xSIFS
CTS
Data frame
ACK
WS 1
AP
NAV = Data + ACK + 3xSIFS
NAV in RTS
NAV in CTS
Danger of collision
WLAN, part 2
Wireless Innovative Transmission Lab 25
Exposed Terminal Problem
WLAN, part 2
Wireless Innovative Transmission Lab 26
Exposed Terminal Problem
WLAN, part 2
Wireless Innovative Transmission Lab 27
Advantage of RTS & CTS (1)
Usage of RTS/CTS offers an advantage if the data frame
is very long compared to the RTS frame:
RTS
CTS
Data frame
ACK
WS 1
AP
Short interval: collision not likely
Data frame
ACK
WS 1
AP
Long interval: collision likely
(RTS/CTS not used)
(RTS/CTS used)
WLAN, part 2
Wireless Innovative Transmission Lab 28
Advantage of RTS & CTS (2)
A long “collision danger” interval (previous slide) should
be avoided for the following reasons:
Larger probability of collision
Greater waste of capacity if a collision occurs and the
frame has to be retransmitted.
A threshold parameter (IEEE 802.11 frame~Threshold)
can be set in the wireless station. Frames shorter than
this value will be transmitted without using RTS/CTS.
WLAN, part 2
Wireless Innovative Transmission Lab 29
Fragmentation
Fragmentation makes use of the RTS/CTS scheme and the
NAV mechanism:
RTS
SIFS
DIFS
RTS
CTS
Frag 0
ACK 0
SIFS
SIFS
WS 1
AP
CTS
NAV in WS
NAV in AP
Frag 1
ACK 1
SIFS
SIFS
Frag 0
ACK 0
WLAN, part 2
Wireless Innovative Transmission Lab 30
Advantage of fragmentation
Transmitting long data frames should be avoided for the
following reasons:
Larger probability that the frame is erroneous
Greater waste of capacity if a frame error occurs and
the whole frame has to be retransmitted.
A threshold parameter (dot11FragmentationThreshold)
can be set in the wireless station. Frames longer than
this value will be transmitted using fragmentation.
WLAN, part 2
Wireless Innovative Transmission Lab 31
WBAN CSMA/CA
Transmitting long data frames should be avoided for the
following reasons:
Larger probability that the frame is erroneous
Greater waste of capacity if a frame error occurs and
the whole frame has to be retransmitted.
A threshold parameter (dot11FragmentationThreshold)
can be set in the wireless station. Frames longer than
this value will be transmitted using fragmentation.
WLAN, part 2
Wireless Innovative Transmission Lab 32
B
MAP1 MAP2
EAP1 RAP1 EAP2 RAP2 CAP
Beacon period (superframe) n
B2
7
UP
CSMA/Slotted
Aloha
7
UP
CSMA/Slotted
Aloha
s
All UP
CSMA/Slotted
Aloha Polling Mechanisms
s
All UP
CSMA/Slotted
Aloha
s
All UP
CSMA/Slotted
Aloha
Polling Mechanisms
WBAN
WLAN, part 2
Wireless Innovative Transmission Lab 33
Start
Channel is
Busy?
BC = BC-1
BC=0?
Transmit Packet and
Wait for ACK
ACK received
within timeout
period?
Freeze the BC
node has a
packet to
transmit
UPi
Y
Y
N
N
N
Y
N
j=j+1
CW CW
i,j i,max
>
Backoff Counter
(BC)=rand (1,CW )
,min
i
Y
N
BC=rand (1,CW )
i,j
BC=rand (1,CW )
i,max
Collision Counter
j=0
  New CW Size;
j
2
CW =2 CW
i,j i,min
 
 
 
 
 
WBAN CSMA/CA
(Flowchart)
WLAN, part 2
Wireless Innovative Transmission Lab 34
Start
Current time is
outside of suitable
access phase?
Channel is
Busy?
No enough time left
in the suitable access
phase(s) to transmit
the packet?
BC = BC-1
BC=0?
Transmit Packet and
Wait for ACK
ACK received
within timeout
period?
Freeze the BC
node has a
packet to
transmit
UPi
Y
Y
Y
N
N
N
N
Y
Y
N
j=j+1
CW CW
i,j i,max
>
Backoff Counter
(BC)=rand (1,CW )
,min
i
Y
N
BC=rand (1,CW )
i,j
BC=rand (1,CW )
i,max
Collision Counter
j=0
  New CW Size;
j
2
CW =2 CW
i,j i,min
 
 
 
 
 
End
WBAN CSMA/CA
Flowchart for all the
access phases

More Related Content

Similar to csma.pdf

WirelessB06.ppt
WirelessB06.pptWirelessB06.ppt
WirelessB06.ppt
BushraBush2
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
nooralleema
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
RMK ENGINEERING COLLEGE, CHENNAI
 
Computer network (1)
Computer network (1)Computer network (1)
Computer network (1)
NYversity
 
WLAN
WLANWLAN
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CA
Soumen Santra
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
mmjalbiaty
 
802 tutorial
802 tutorial802 tutorial
802 tutorial
trimba
 
Mac
MacMac
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
Data_Link_Layer.ppt
Data_Link_Layer.pptData_Link_Layer.ppt
Data_Link_Layer.ppt
NicetomeetYou2
 
Data Link Layer of OSI Model responsibilities
Data Link Layer of OSI Model responsibilitiesData Link Layer of OSI Model responsibilities
Data Link Layer of OSI Model responsibilities
HemantPareek21
 
Data linkcontrol
Data linkcontrolData linkcontrol
Data linkcontrol
Bablu Shofi
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdf
arihantmobileselepun
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lan
yanhul
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
JeoffnaRuth
 
Mac
MacMac
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
Deepak John
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
DigiPlexus
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
ssuser35e92d
 

Similar to csma.pdf (20)

WirelessB06.ppt
WirelessB06.pptWirelessB06.ppt
WirelessB06.ppt
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
Computer network (1)
Computer network (1)Computer network (1)
Computer network (1)
 
WLAN
WLANWLAN
WLAN
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CA
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
802 tutorial
802 tutorial802 tutorial
802 tutorial
 
Mac
MacMac
Mac
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
Data_Link_Layer.ppt
Data_Link_Layer.pptData_Link_Layer.ppt
Data_Link_Layer.ppt
 
Data Link Layer of OSI Model responsibilities
Data Link Layer of OSI Model responsibilitiesData Link Layer of OSI Model responsibilities
Data Link Layer of OSI Model responsibilities
 
Data linkcontrol
Data linkcontrolData linkcontrol
Data linkcontrol
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdf
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lan
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
Mac
MacMac
Mac
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
 

Recently uploaded

Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 

Recently uploaded (20)

Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 

csma.pdf

  • 1. WLAN, part 2 Wireless Innovative Transmission Lab 1 Contents IEEE 802.11 MAC layer operation • Basic CSMA/CA operation • Network Allocation Vector (NAV) • Backoff operation • Wireless medium access example Usage of RTS / CTS
  • 2. WLAN, part 2 Wireless Innovative Transmission Lab 2
  • 3. WLAN, part 2 Wireless Innovative Transmission Lab 3
  • 4. WLAN, part 2 Wireless Innovative Transmission Lab 4 Medium Access Control (MAC) LLC MAC PHY : Medium access control: Different nodes must gain access to the shared medium (for instance a wireless channel) in a controlled fashion (otherwise there will be collisions). FDMA TDMA CDMA CSMA Assigning channels in frequency domain Assigning time slots in time domain Assigning code sequences in code domain Assigning transmission opportunities in time domain on a statistical basis (Randomly chosen numbers) Access methods:
  • 5. WLAN, part 2 Wireless Innovative Transmission Lab 5 CSMA/CD vs. CSMA/CA (1) CSMA/CD (Collision Detection) is the MAC method used in a wired LAN (Ethernet). Wired LAN stations can (whereas wireless stations cannot) detect collisions. Basic CSMA/CD operation: 1) Wait for free medium 2) Transmit frame 3) If collision, stop transmission immediately 4) Retransmit after random time (backoff) CSMA/CD rule: Backoff after collision
  • 6. WLAN, part 2 Wireless Innovative Transmission Lab 6 CSMA/CD (Flowchart)
  • 7. WLAN, part 2 Wireless Innovative Transmission Lab 7 CSMA/CD vs. CSMA/CA (2) CSMA/CA (Collision Avoidance) is the MAC method used in a wireless LAN. Wireless stations cannot detect collisions (i.e. the whole packets will be transmitted anyway). Basic CSMA/CA operation: 1) Wait for free medium 2) Wait a random time (backoff) 3) Transmit frame 4) If collision, the stations do not notice it 5) Collision => erroneous frame => no ACK returned CSMA/CA rule: Backoff before collision
  • 8. WLAN, part 2 Wireless Innovative Transmission Lab 8 CSMA/CA (Flowchart)
  • 9. WLAN, part 2 Wireless Innovative Transmission Lab 9 Basic wireless medium access AP transmission in downlink (from the AP) and transmission in uplink (from a station) CSMA: One packet at a time wired LAN
  • 10. WLAN, part 2 Wireless Innovative Transmission Lab 10 Wireless medium access (1) DIFS SIFS ACK (B=>A) Transmitted frame (A=>B) When a frame is received without bit errors, the receiving station (B) sends an Acknowledgement (ACK) frame back to the transmitting station (A). If the received frame is erroneous, no ACK will be sent
  • 11. WLAN, part 2 Wireless Innovative Transmission Lab 11 Wireless medium access (2) DIFS SIFS DIFS ACK (B=>A) Transmitted frame (A=>B) During the transmission sequence (Frame + SIFS + ACK) the medium (radio channel) is reserved. The next frame can be transmitted at earliest after the next DIFS period. Next frame (from any station) Earliest allowed transmission time of next frame
  • 12. WLAN, part 2 Wireless Innovative Transmission Lab 12 Wireless medium access (5) The two most important interframe spacing times are SIFS and DIFS: SIFS (Short Interframe Space) = 10 µs (16 µs) DIFS (DCF Interframe Space) = 50 µs (34 µs) When two stations try to access the medium at the same time, the one that has to wait for the time SIFS wins over the one that has to wait for the time DIFS. In other words, SIFS has higher priority over DIFS. 802.11b 802.11g
  • 13. WLAN, part 2 Wireless Innovative Transmission Lab 13 Wireless medium access (8) DIFS SIFS t > DIFS ACK (B=>A) Transmitted frame (A=>B) When a station wants to send a frame and the channel has been idle for a time > DIFS (counted from the moment the station first probed the channel) => can send immediately. Next frame (from any station) Channel was idle at least DIFS seconds
  • 14. WLAN, part 2 Wireless Innovative Transmission Lab 14 Wireless medium access (9) DIFS SIFS DIFS ACK (B=>A) Transmitted frame (A=>B) When a station wants to send a frame and the channel is busy => the station must wait a backoff time before it is allowed to transmit the frame. Reason? Next two slides… Next frame Channel was busy when station wanted to send frame Backoff
  • 15. WLAN, part 2 Wireless Innovative Transmission Lab 15 No backoff => collision is certain Suppose that several stations (B and C in the figure) are waiting to access the wireless medium. When the channel becomes idle, these stations start sending their packets at the same time => collision! Station A Station B Station C DIFS Collision! ACK
  • 16. WLAN, part 2 Wireless Innovative Transmission Lab 16 Backoff => collision probability is reduced Contending stations generate random backoff values bn. Backoff counters count downwards, starting from bn. When a counter reaches zero, the station is allowed to send its frame. All other counters stop counting until the channel becomes idle again. Station A Station B Station C DIFS bn is large bn is small Backoff Remaining backoff time ACK
  • 17. WLAN, part 2 Wireless Innovative Transmission Lab 17 Contention window (CW) for 802.11b If transmission of a frame was unsuccessful and the frame is allowed to be retransmitted, before each retransmission the Contention Window (CW) from which bn is chosen is increased. DIFS … CW = 25-1 = 31 slots (slot = 20 µs) Initial attempt DIFS … CW = 26-1 = 63 slots 1st retransm. DIFS CW = 210-1 = 1023 slots 5th (and further) retransmissions : … CW 802.11b
  • 18. WLAN, part 2 Wireless Innovative Transmission Lab 18 Contention window (CW) for 802.11g In the case of 802.11g operation, the initial CW length is 15 slots. The slot duration is 9 µs. The backoff operation of 802.11g is substantially faster than that of 802.11b. DIFS … CW = 24-1 = 15 slots (slot = 9 µs) Initial attempt DIFS … CW = 25-1 = 31 slots 1st retransm. DIFS CW = 210-1 = 1023 slots 6th (and further) retransmissions : … CW 802.11g
  • 19. WLAN, part 2 Wireless Innovative Transmission Lab 19 No shortcuts for any station… DIFS SIFS DIFS ACK (B=>A) Transmitted frame (A=>B) Next frame (A=>B) Backoff When a station wants to send more than one frame, it has to use the backoff mechanism like any other station (of course it can ”capture” the channel by sending a long frame, for instance using fragmentation).
  • 20. WLAN, part 2 Wireless Innovative Transmission Lab 20 Hidden Terminal Problem A B X carrier not free ≠ OK to transmit
  • 21. WLAN, part 2 Wireless Innovative Transmission Lab 21 Usage of RTS & CTS The RTS/CTS (Request/Clear To Send) scheme is used as a countermeasure against the “hidden node” problem: AP WS 1 WS 2 Hidden node problem: WS 1 and WS 2 can ”hear” the AP but not each other => If WS 1 sends a packet, WS 2 does not notice this (and vice versa) => collision!
  • 22. WLAN, part 2 Wireless Innovative Transmission Lab 22 Reservation of medium using NAV The RTS/CTS scheme makes use of “SIFS-only” and the NAV (Network Allocation Vector) to reserve the medium: RTS SIFS DIFS NAV = CTS + Data + ACK + 3xSIFS CTS Data frame ACK SIFS SIFS WS 1 AP NAV = Data + ACK + 2xSIFS NAV in RTS NAV in CTS
  • 23. WLAN, part 2 Wireless Innovative Transmission Lab 23 CSMA/CA and NAV
  • 24. WLAN, part 2 Wireless Innovative Transmission Lab 24 Danger of collision only during RTS WS 2 does not hear the RTS frame (and associated NAV), but can hear the CTS frame (and associated NAV). RTS NAV = CTS + Data + ACK + 3xSIFS CTS Data frame ACK WS 1 AP NAV = Data + ACK + 3xSIFS NAV in RTS NAV in CTS Danger of collision
  • 25. WLAN, part 2 Wireless Innovative Transmission Lab 25 Exposed Terminal Problem
  • 26. WLAN, part 2 Wireless Innovative Transmission Lab 26 Exposed Terminal Problem
  • 27. WLAN, part 2 Wireless Innovative Transmission Lab 27 Advantage of RTS & CTS (1) Usage of RTS/CTS offers an advantage if the data frame is very long compared to the RTS frame: RTS CTS Data frame ACK WS 1 AP Short interval: collision not likely Data frame ACK WS 1 AP Long interval: collision likely (RTS/CTS not used) (RTS/CTS used)
  • 28. WLAN, part 2 Wireless Innovative Transmission Lab 28 Advantage of RTS & CTS (2) A long “collision danger” interval (previous slide) should be avoided for the following reasons: Larger probability of collision Greater waste of capacity if a collision occurs and the frame has to be retransmitted. A threshold parameter (IEEE 802.11 frame~Threshold) can be set in the wireless station. Frames shorter than this value will be transmitted without using RTS/CTS.
  • 29. WLAN, part 2 Wireless Innovative Transmission Lab 29 Fragmentation Fragmentation makes use of the RTS/CTS scheme and the NAV mechanism: RTS SIFS DIFS RTS CTS Frag 0 ACK 0 SIFS SIFS WS 1 AP CTS NAV in WS NAV in AP Frag 1 ACK 1 SIFS SIFS Frag 0 ACK 0
  • 30. WLAN, part 2 Wireless Innovative Transmission Lab 30 Advantage of fragmentation Transmitting long data frames should be avoided for the following reasons: Larger probability that the frame is erroneous Greater waste of capacity if a frame error occurs and the whole frame has to be retransmitted. A threshold parameter (dot11FragmentationThreshold) can be set in the wireless station. Frames longer than this value will be transmitted using fragmentation.
  • 31. WLAN, part 2 Wireless Innovative Transmission Lab 31 WBAN CSMA/CA Transmitting long data frames should be avoided for the following reasons: Larger probability that the frame is erroneous Greater waste of capacity if a frame error occurs and the whole frame has to be retransmitted. A threshold parameter (dot11FragmentationThreshold) can be set in the wireless station. Frames longer than this value will be transmitted using fragmentation.
  • 32. WLAN, part 2 Wireless Innovative Transmission Lab 32 B MAP1 MAP2 EAP1 RAP1 EAP2 RAP2 CAP Beacon period (superframe) n B2 7 UP CSMA/Slotted Aloha 7 UP CSMA/Slotted Aloha s All UP CSMA/Slotted Aloha Polling Mechanisms s All UP CSMA/Slotted Aloha s All UP CSMA/Slotted Aloha Polling Mechanisms WBAN
  • 33. WLAN, part 2 Wireless Innovative Transmission Lab 33 Start Channel is Busy? BC = BC-1 BC=0? Transmit Packet and Wait for ACK ACK received within timeout period? Freeze the BC node has a packet to transmit UPi Y Y N N N Y N j=j+1 CW CW i,j i,max > Backoff Counter (BC)=rand (1,CW ) ,min i Y N BC=rand (1,CW ) i,j BC=rand (1,CW ) i,max Collision Counter j=0   New CW Size; j 2 CW =2 CW i,j i,min           WBAN CSMA/CA (Flowchart)
  • 34. WLAN, part 2 Wireless Innovative Transmission Lab 34 Start Current time is outside of suitable access phase? Channel is Busy? No enough time left in the suitable access phase(s) to transmit the packet? BC = BC-1 BC=0? Transmit Packet and Wait for ACK ACK received within timeout period? Freeze the BC node has a packet to transmit UPi Y Y Y N N N N Y Y N j=j+1 CW CW i,j i,max > Backoff Counter (BC)=rand (1,CW ) ,min i Y N BC=rand (1,CW ) i,j BC=rand (1,CW ) i,max Collision Counter j=0   New CW Size; j 2 CW =2 CW i,j i,min           End WBAN CSMA/CA Flowchart for all the access phases