Wireless Medium Access Control MAC Romit Roy Choudhury

  • Slides: 80
Download presentation
Wireless Medium Access Control (MAC) Romit Roy Choudhury Wireless Networking Lectures University of Illinois

Wireless Medium Access Control (MAC) Romit Roy Choudhury Wireless Networking Lectures University of Illinois at Urbana Champaign 1

Wired Vs Wireless Media Access Both are on shared media. Then, what’s really the

Wired Vs Wireless Media Access Both are on shared media. Then, what’s really the problem ? 2

The Channel Access Problem § Multiple nodes share a channel A § B C

The Channel Access Problem § Multiple nodes share a channel A § B C Pairwise communication desired § Simultaneous communication not possible § MAC Protocols § Suggests a scheme to schedule communication • Maximize number of communications • Ensure fairness among all transmitters 3

The Trivial Solution A B C collision § Transmit and pray § Plenty of

The Trivial Solution A B C collision § Transmit and pray § Plenty of collisions --> poor throughput at high load 4

The Simple Fix A § Transmit and pray Don’t transmit B C Can collisions

The Simple Fix A § Transmit and pray Don’t transmit B C Can collisions still occur? § Plenty of collisions --> poor throughput at high load § Listen before you talk § Carrier sense multiple access (CSMA) § Defer transmission when signal on channel 5

Collisions in CSMA (Carrier Sense Multiple Access) Collisions can still occur: spatial layout of

Collisions in CSMA (Carrier Sense Multiple Access) Collisions can still occur: spatial layout of nodes Propagation delay non-zero between transmitters When collision: Entire packet transmission time wasted note: Role of distance & propagation delay in determining collision probability 6

CSMA/CD (Collision Detection) § Keep listening to channel § While transmitting § If (Transmitted_Signal

CSMA/CD (Collision Detection) § Keep listening to channel § While transmitting § If (Transmitted_Signal != Sensed_Signal) Sender knows it’s a Collision ABORT 7

2 Observations on CSMA/CD § Transmitter can send/listen concurrently § If (Transmitted - Sensed

2 Observations on CSMA/CD § Transmitter can send/listen concurrently § If (Transmitted - Sensed = null)? Then success § The signal is identical at Tx and Rx § Non-dispersive The TRANSMITTER can detect if and when collision occurs 8

Unfortunately … Both observations do not hold for wireless Because … 9

Unfortunately … Both observations do not hold for wireless Because … 9

Wireless Medium Access Control A C D B Signal power Distance 10

Wireless Medium Access Control A C D B Signal power Distance 10

Wireless Medium Access Control C A D B Signal power Decoding threshold Sensing threshold

Wireless Medium Access Control C A D B Signal power Decoding threshold Sensing threshold Distance 11

Wireless Media Disperse Energy A cannot send and listen in parallel A C D

Wireless Media Disperse Energy A cannot send and listen in parallel A C D B Signal power Distance 12

Collision Detection Difficult D A B C § Signal reception based on SINR §

Collision Detection Difficult D A B C § Signal reception based on SINR § Transmitter can only hear itself § Cannot determine signal quality at receiver 13

Calculating SINR D A B C 14

Calculating SINR D A B C 14

Red signal >> Blue signal X A C B D Signal power Distance 15

Red signal >> Blue signal X A C B D Signal power Distance 15

No Collisions A’s signal at C is above sensing threshold, hence, C does not

No Collisions A’s signal at C is above sensing threshold, hence, C does not transmit X A C B D Signal power Distance 16

C cannot sense A, assumes channel is free, transmits and collides at B C

C cannot sense A, assumes channel is free, transmits and collides at B C is the hidden terminal to A X A C B D Signal power Distance 17

C cannot sense A, assumes channel is free, transmits and collides at B C

C cannot sense A, assumes channel is free, transmits and collides at B C is the hidden terminal to A X A C B D Signal power Decrease sensing threshold C will not transmit No collisions Distance 18

Exposed terminal problem 19

Exposed terminal problem 19

Exposed terminal problem X A C B D Signal power Distance 20

Exposed terminal problem X A C B D Signal power Distance 20

Exposed terminal problem X A C B D Signal power Distance 21

Exposed terminal problem X A C B D Signal power Distance 21

Any Questions at this point? 22

Any Questions at this point? 22

So, how do we cope with Hidden/Exposed Terminals? 23

So, how do we cope with Hidden/Exposed Terminals? 23

The Emergence of MACA, MACAW, & 802. 11 § Wireless MAC proved to be

The Emergence of MACA, MACAW, & 802. 11 § Wireless MAC proved to be non-trivial § 1992 - research by Karn (MACA) § 1994 - research by Bhargavan (MACAW) § Led to IEEE 802. 11 committee § The standard was ratified in 1999 24

IEEE 802. 11 RTS = Request To Send CTS = Clear To Send M

IEEE 802. 11 RTS = Request To Send CTS = Clear To Send M S Y RTS D CTS X K 25

IEEE 802. 11 silenced M S Data Y D silenced ACK X silenced K

IEEE 802. 11 silenced M S Data Y D silenced ACK X silenced K 26

IEEE 802. 11 M silenced M S Data Y D silenced ACK X silenced

IEEE 802. 11 M silenced M S Data Y D silenced ACK X silenced K 27

802. 11 Steps § All backlogged nodes choose a random number § R =

802. 11 Steps § All backlogged nodes choose a random number § R = rand (0, CW_min) § Each node counts down R § Continue carrier sensing while counting down § Once carrier busy, freeze countdown § Whoever reaches ZERO transmits RTS § Neighbors freeze countdown, decode RTS § RTS contains (CTS + DATA + ACK) duration = T_comm § Neighbors set NAV = T_comm • Remains silent for NAV time 28

802. 11 Steps § Receiver replies with CTS § Also contains (DATA + ACK)

802. 11 Steps § Receiver replies with CTS § Also contains (DATA + ACK) duration. § Neighbors update NAV again § Tx sends DATA, Rx acknowledges with ACK § After ACK, everyone initiates remaining countdown § Tx chooses new R = rand (0, CW_min) § If RTS or DATA collides (i. e. , no CTS/ACK returns) § § Indicates collision RTS chooses new random no. R 1 = rand (0, 2*CW_min) Note Exponential Backoff Ri = rand (0, 2^i * CW_min) Once successful transmission, reset to rand(0, CW_min) 29

But is that enough? 30

But is that enough? 30

RTS/CTS § Does it solve hidden terminals ? § Assuming carrier sensing zone =

RTS/CTS § Does it solve hidden terminals ? § Assuming carrier sensing zone = communication zone E RTS F CTS A B C CTS D E does not receive CTS successfully Can later initiate transmission to D. Hidden terminal problem remains. 31

Hidden Terminal Problem § How about increasing carrier sense range ? ? § E

Hidden Terminal Problem § How about increasing carrier sense range ? ? § E will defer on sensing carrier no collision !!! E RTS F CTS A B C Data D 32

Hidden Terminal Problem § But what if barriers/obstructions ? ? § E doesn’t hear

Hidden Terminal Problem § But what if barriers/obstructions ? ? § E doesn’t hear C Carrier sensing does not help E RTS F CTS A B C Data D 33

Exposed Terminal § E should be able to transmit to F § Carrier sensing

Exposed Terminal § E should be able to transmit to F § Carrier sensing makes the situation worse F E RTS A B C D 34

Thoughts ! § 802. 11 does not solve HT/ET completely § Only alleviates the

Thoughts ! § 802. 11 does not solve HT/ET completely § Only alleviates the problem through RTS/CTS and recommends larger CS zone § Large CS zone aggravates exposed terminals § Spatial reuse reduces A tradeoff § RTS/CTS packets also consume bandwidth § Moreover, backing off mechanism is also wasteful The search for the best MAC protocol is still on. However, 802. 11 is being optimized too. Thus, wireless MAC research still alive 35

Takes on 802. 11 § Role of RTS/CTS § Useful? No? § Is it

Takes on 802. 11 § Role of RTS/CTS § Useful? No? § Is it a one-fit-all? Where does it not fit? § Is ACK necessary? § MACA said no ACKs. Let TCP recover from losses § Should Carrier Sensing replace RTS/CTS? § New opportunities may not need RTS/CTS § Infratructured wireless networks (EWLAN) 36

Some other thoughts! 37

Some other thoughts! 37

TDMA (Time Division Multiple Access) § CSMA is sense and share. § Possible to

TDMA (Time Division Multiple Access) § CSMA is sense and share. § Possible to not sense, but pre-schedule § TDMA in time, FDMA in frequency § Underpinned by the graph coloring problem 38

Many Other Variants § Many techniques combine “lego blocks” § See next slides for

Many Other Variants § Many techniques combine “lego blocks” § See next slides for a few samples 39

MACA-BI [Gerla. UCLA] § RTS/CTS/ACK are control overhead § Needed to reduce it §

MACA-BI [Gerla. UCLA] § RTS/CTS/ACK are control overhead § Needed to reduce it § Rx predicts trasmission from the Tx § Traffic estimation (? ? ? ) § If Rx thinks Tx has pending packets for Rx § Rx transmits RTR to Tx § Tx replies with Data § Improves MACA with no RTS/ACK § improvement but not too much 40

Implicit MACKnowledgment § APs typically backlogged with traffic § Persistent traffic possibility of optimzation

Implicit MACKnowledgment § APs typically backlogged with traffic § Persistent traffic possibility of optimzation § We propose an implicit ACK optimization § Piggyback the CTS with ACK for previous dialog 802. 11 Gain Implicit ACK 41

Optimizations to 802. 11 T R RTS Backoff RTS CTS +ACK 1 RTS CTS

Optimizations to 802. 11 T R RTS Backoff RTS CTS +ACK 1 RTS CTS Data 1 Poll +ACK 1 Data 2 CTS Data Backoff CTS Data ACK R RTS CTS ACK T Poll +ACK 2 RTS CTS +ACK 2 Backoff R Backoff T Hybrid Channel Access Implicit ACK Data 3 Backoff 802. 11 42

Seedex [Kumar. UIUC 03] § Forget channel reservation and backoff § Instead, let nodes

Seedex [Kumar. UIUC 03] § Forget channel reservation and backoff § Instead, let nodes pick sequence of time slots § Decides to probably transmit in some, else listen § Transmit slots chosen using a random seed § Publishes the seed to 2 -hop neighbors § When PT slots arrive, nodes transmit with § Probability “p” § “p” chosen as a function of overlapping neighbors 43

Hot Research Topics § Power control increases spatial reuse § Whisper in the room

Hot Research Topics § Power control increases spatial reuse § Whisper in the room so that many people can talk § Rate control based on channel quality § Expolit channel diversity § Utilize multiple channels to parallelize dialogs § Exploit spatial diversity § Use directional antennas to interfere over smaller region (next class) … and many more topics 44

Questions ? 45

Questions ? 45

Backup slides on IEEE 802. 11 Read for more details 46

Backup slides on IEEE 802. 11 Read for more details 46

Today’s Discussions § IEEE 802. 11 overview - some raw data § § §

Today’s Discussions § IEEE 802. 11 overview - some raw data § § § Architecture PHY specifications – Spread Spectrum radios: FH & DS MAC specifications – DCF and PCF Synchronization, Power management, Roaming, Scanning Security Deliberations on 802. 11 (DCF) MAC § Hidden terminal & Exposed terminal issues § Carrier sensing § Some other ideas & open challenges § Could be interesting for the project 47

IEEE 802. 11 – An overview 48

IEEE 802. 11 – An overview 48

IEEE 802. 11 in OSI Model Wireless 49

IEEE 802. 11 in OSI Model Wireless 49

802. 11 Scope & Modules To develop a MAC and PHY spec for wireless

802. 11 Scope & Modules To develop a MAC and PHY spec for wireless connectivity for fixed, portable and moving stations in a local area LLC MAC PHY MAC Sublayer PLCP Sublayer PMD Sublayer MAC Layer Management PHY Layer Management 50

Applications Single Hop § Home networks § Enterprise networks (e. g. , offices, labs,

Applications Single Hop § Home networks § Enterprise networks (e. g. , offices, labs, etc. ) § Outdoor areas (e. g. , cities, parks, etc. ) Multi-hops § Adhoc network of small groups (e. g. , aircrafts) § Balloon networks (Space. Data Inc. ) § Mesh networks (e. g. , routers on lamp-posts) 51

802. 11 Architecture – Two modes 52

802. 11 Architecture – Two modes 52

802. 11 PHY Technologies § Two kinds of radios based on § “Spread Spectrum”

802. 11 PHY Technologies § Two kinds of radios based on § “Spread Spectrum” § “Diffused Infrared” § Spread Spectrum radios based on § Frequency hopping (FH) § Direct sequence (DS) Radio works in 2. 4 GHz ISM band --- license-free by FCC (USA), ETSI (Europe), and MKK (Japan) § 1 Mbps and 2 Mbps operation using FH § 1, 2, 5. 5, and 11 Mbps operation using DSSS (FCC) 53

Why Spread Spectrum ? § § C = B*log 2(1+S/N) To achieve the same

Why Spread Spectrum ? § § C = B*log 2(1+S/N) To achieve the same channel capacity C . . . [Shannon] § Large S/N, small B § Small S/N, large B § Increase S/N is inefficient due to the logarithmic relationship power signal noise, interferences frequency signal B B e. g. B = 30 KHz e. g. B = 1. 25 MHz 54

Spread Spectrum Methods for spreading the bandwidth of the transmitted signal over a frequency

Spread Spectrum Methods for spreading the bandwidth of the transmitted signal over a frequency band (spectrum) which is wider than the minimum bandwidth required to transmit the signal. § § § Reduce effect of jamming § Military scenarios Reduce effect of other interferences More “secure” § Signal “merged” in noise and interference 55

Frequency Hopping SS (FHSS) § 2. 4 GHz band divided into 75 1 MHz

Frequency Hopping SS (FHSS) § 2. 4 GHz band divided into 75 1 MHz subchannels § Sender and receive agree on a hopping pattern (pseudo random series). 22 hopping patterns defined One possible pattern f f f § Different hopping sequences enable co§ existence of multiple BSSs Robust against narrow-band interferences 56

FHSS due to [Lamarr 1940] power signal noise, interferences frequency B f f signal

FHSS due to [Lamarr 1940] power signal noise, interferences frequency B f f signal f f f f f B Simple radio design with FHSS Data rates ~ 2 Mbps Invented by Hedy Lamarr (Hollywood film star) in 1940, at age of 27, with musician George Antheil 57

Direct Sequence SS § Direct sequence (DS): most prevalent § Signal is spread by

Direct Sequence SS § Direct sequence (DS): most prevalent § Signal is spread by a wide bandwidth pseudorandom sequence (code sequence) § Signals appear as wideband noise to unintended receivers § Not for intra-cell multiple access § Nodes in the same cell use same code sequence 58

IEEE 802. 11 b DSSS § § § ISM unlicensed frequency band (2. 4

IEEE 802. 11 b DSSS § § § ISM unlicensed frequency band (2. 4 GHz) Channel bandwidth: fhigh – flow = 22 MHz 1 MHz guard band Direct sequence spread spectrum in each channel 3 non-overlapping channels Channel flow fhigh 1 2. 401 2. 423 2 2. 404 2. 428 3 2. 411 2. 433 4 2. 416 2. 438 5 2. 421 2. 443 6 2. 426 2. 448 7 2. 431 2. 453 8 2. 436 2. 458 9 2. 441 2. 463 10 2. 446 2. 468 11 2. 451 2. 473 59

Diffused Infrared § Wavelength range from 850 – 950 nm § For indoor use

Diffused Infrared § Wavelength range from 850 – 950 nm § For indoor use only § Line-of-sight and reflected transmission § 1 – 2 Mbps 60

PHY Sublayers § Physical layer convergence protocol (PLCP) § Provides common interface for MAC

PHY Sublayers § Physical layer convergence protocol (PLCP) § Provides common interface for MAC • Offers carrier sense status & CCA (Clear channel assesment) • Performs channel synchronization / training § Physical medium dependent sublayer (PMD) § Functions based on underlying channel quality and characteristics • E. g. , Takes care of the wireless encoding 61

PLCP (802. 11 b) long preamble 192 us short preamble 96 us (Vo. IP,

PLCP (802. 11 b) long preamble 192 us short preamble 96 us (Vo. IP, video) 62

PLCP (802. 11 b) long preamble 192 us Note: To send even one bit

PLCP (802. 11 b) long preamble 192 us Note: To send even one bit payload reliably, you will have to form a packet with the PLCP preamble and the PLCP header. This constraints protocol design You cannot arbitrarily exchange control messages. What are the control messages in IEEE 802. 11 ? short preamble 96 us (Vo. IP, video) 63

IEEE 802. 11 MAC 64

IEEE 802. 11 MAC 64

802. 11 MAC (DCF) § CSMA/CA based protocol § Listen before you talk §

802. 11 MAC (DCF) § CSMA/CA based protocol § Listen before you talk § CA = Collision avoidance (prevention is better than cure !!) § Robust for interference § Explicit acknowledgment requested from receiver • for unicast frames § Only CSMA/CA for Broadcast frames § Optional RTS/CTS offers Virtual Carrier Sensing § RTS/CTS includes duration of immediate dialog § Addresses hidden terminal problems 65

802. 11 MAC (DCF) 66

802. 11 MAC (DCF) 66

Physical Carrier Sense & Backoff 67

Physical Carrier Sense & Backoff 67

MAC Management Layer § Synchronization § Finding and staying with a WLAN • Uses

MAC Management Layer § Synchronization § Finding and staying with a WLAN • Uses TSF timers and beacons § Power Management § Sleeping without missing any messages • Periodic sleep, frame buffering, traffic indication map § Association and Reassociation § Joining a network § Roaming, moving from one AP to another § Scanning 68

Synchronization § Timing Synchronization Function (TSF) § Enables synchronous waking/sleeping § Enables switching from

Synchronization § Timing Synchronization Function (TSF) § Enables synchronous waking/sleeping § Enables switching from DCF to PCF § Enables frequency hopping in FHSS PHY • Transmitter and receiver has identical dwell interval at each center frequency § Achieving TSF § All stations maintain a local timer. § AP periodically broadcasts beacons containing timestamps, management info, roaming info, etc. • Not necessary to hear every beacon § Beacon synchronizes entire BSS • Applicable in infrastructure mode ONLY § Distributed TSF (for Independent BSS) more difficult 69

Power management § Battery powered devices require power efficiency § LAN protocols assume idle

Power management § Battery powered devices require power efficiency § LAN protocols assume idle nodes are always ON and thus ready to receive. § Idle-receive state key source of power wastage § Devices need to power off during idle periods § Achieving power conservation § Yet maintain an active session – tradeoff power Vs throughput § Allow idle stations to go to sleep periodically § APs buffer packets for sleeping stations § AP announces which stations have frames buffered when all stations are awake – called Traffic Indication Map (TIM) • TSF assures AP and Power Save stations are synchronized • TSF timer keeps running when stations are sleeping § Independent BSS also have Power Management § Similar in concept, distributed approach 70

Roaming & Scanning § Stations switch (roam) to different AP § When channel quality

Roaming & Scanning § Stations switch (roam) to different AP § When channel quality with current AP is poor § Scanning function used to find better AP § Passive Scanning Listen for beacon from different Aps § Active Scanning Exchange explicit beacons to determine best AP § Station sends Reassociation Request to new AP § If Reassociation Response successful Roaming § If AP accepts Reassociation Request § AP indicates Reassociation to the Distribution System § Distribution System information is updated § Normally old AP is notified through Distribution System 71

MAC management frame § § § Beacon § Timestamp, Beacon Interval, Capabilities, ESSID, Supported

MAC management frame § § § Beacon § Timestamp, Beacon Interval, Capabilities, ESSID, Supported Rates, parameters § Traffic Indication Map Probe § ESSID, Capabilities, Supported Rates Probe Response § Timestamp, Beacon Interval, Capabilities, ESSID, Supported Rates, parameters § same for Beacon except for TIM Association Request § Capability, Listen Interval, ESSID, Supported Rates Association Response § Capability, Status Code, Station ID, Supported Rates 72

MAC Management Frame § § § Reassociation Request § Capability, Listen Interval, ESSID, Supported

MAC Management Frame § § § Reassociation Request § Capability, Listen Interval, ESSID, Supported Rates, Current AP Address Reassociation Response § Capability, Status Code, Station ID, Supported Rates Disassociation § Reason code Authentication § Algorithm, Sequence, Status, Challenge Text Deauthentication Reason 73

Security § Range of attacks huge in wireless § Easy entry into the network

Security § Range of attacks huge in wireless § Easy entry into the network § Jamming, selfish behavior, spatial overhearing § Securing the network harder than wired networks § Especially in distributed environments § § WEP symmetric 40 or 128 -bit encryption WPA: Wi-Fi protected access § Temporal key integrity protocol (TKIP) – better § User authentication § IEEE 802. 11 i – Efforts toward higher security 74

PLCP § § PLCP has two structures. § All 802. 11 b systems have

PLCP § § PLCP has two structures. § All 802. 11 b systems have to support Long preamble. § Short preamble option is provided to improve efficiency when trasnmitting voice, Vo. IP, streaming video. PLCP Frame format § PLCP preamble • SFD: start frame delimiter § PLCP header 75

PLCP Header § 8 -bit signal or data rate (DR) indicates how fast §

PLCP Header § 8 -bit signal or data rate (DR) indicates how fast § § § data will be transmitted 8 -bit service field reserved for future 16 -bit length field indicating the length of the ensuing MAC PDU (MAC sublayer’s Protocol Data Unit) 16 -bit Cyclic Redundancy Code 76

Power management approach § § § Allow idle stations to go to sleep §

Power management approach § § § Allow idle stations to go to sleep § station’s power save mode stored in AP APs buffer packets for sleeping stations. § AP announces which stations have frames buffered § Traffic Indication Map (TIM) sent with every Beacon Power Saving stations wake up periodically § listen for Beacons TSF assures AP and Power Save stations are synchronized § stations will wake up to hear a Beacon § TSF timer keeps running when stations are sleeping § synchronization allows extreme low power operation Independent BSS also have Power Management § similar in concept, distributed approach 77

Scanning § § § Scanning required for many functions. § finding and joining a

Scanning § § § Scanning required for many functions. § finding and joining a network § finding a new AP while roaming § initializing an Independent BSS (ad hoc) network 802. 11 MAC uses a common mechanism for all PHY. § single or multi channel § passive or active scanning Passive Scanning § Find networks simply by listening for Beacons Active Scanning § On each channel Send a Probe, Wait for a Probe Response Beacon or Probe Response contains information necessary to join new network. 78

Active scanning example 79

Active scanning example 79

Collision Detection § What is the aim of collision detection ? It’s a transmitter’s

Collision Detection § What is the aim of collision detection ? It’s a transmitter’s job: To determine if the packet was successfully received without explicitly asking the receiver 80