41
LECTURE 4 Medium Access Control 1

LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

LECTURE 4 Medium Access Control

1

Page 2: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Introduction 2

¨  What is medium access? ¤  Who gets to transmit? How? When? ¤  Multiplexing

n  How many stations can share a single link n  FDMA, TDMA, CDMA in circuit switched voice networks n  CSMA/CD in Ethernet (simplicity)

¤  Duplexing n  How communication from station A to station B is separated from the

communication from station B to station A n  FDD or TDD

¨  Impact of architectures ¤  Infrastructure – centralized, fixed base station ¤  Ad hoc – distributed, peer-to-peer

¨  Simplicity and overhead

Page 3: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Duplexing Modes 3

¨  Simplex – one way communication (e.g., broadcast AM) ¨  Duplex – two way communication

¤  TDD – time division duplex n  Users take turns on the channel

¤  FDD – frequency division duplex n  Users get two channels – one for each direction of communication

n  For example one channel for uplink (mobile to base station) another channel for downlink (base station to mobile)

¤ Half-duplex n  As in 802.11, a device cannot simultaneously be transmitting and

receiving

Page 4: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Centralized Multiple Access Techniques 4

¨  FDMA (frequency division multiple access) ¤  Separate spectrum into non-overlapping frequency bands ¤  Assign a certain frequency to a transmission channel between a sender and

a receiver ¤  Different users share use of the medium by transmitting on non-overlapping

frequency bands at the same time

¨  TDMA (time division multiple access): ¤  Assign a fixed frequency to a transmission channel between a sender and a

receiver for a certain amount of time (users share a frequency channel in time slices)

¨  CDMA (code division multiple access): ¤  Assign a user a unique code for transmission between sender and receiver,

users transmit on the same frequency at the same time

Page 5: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Multiple Access (cont) 5

time

freq

uenc

y

user 1

user 2

user 3

guard band

guard band

FDMA

time

freq

uenc

y

user

1

guar

d tim

e

TDMA

time

freq

uenc

y

3

2

CDMA

user

2

user

3

guar

d tim

e

1

3 1,2,3

Wireless systems often use a combination of schemes; GSM – FDD/FDMA/TDMA

Page 6: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Frequency division multiple access 6

time

freq

uenc

y

Page 7: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

FDMA 7

¨  FDMA – simplest and oldest method ¨  Band of width F is divided into T non-overlapping frequency

channels ¤  Guard bands minimize interference between channels ¤  Each station is assigned a different frequency

¨  Can be inefficient if more than T stations want to transmit or traffic is bursty ¤  Results in unused bandwidth and delays

¨  Receiver requires high quality filters for adjacent channel rejection

¨  Used in First Generation Cellular (AMPS, NMT, TACS)

f1 f2

Page 8: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

FDD/FDMA - general scheme, example AMPS (B block)

8

f

t

799

355

799

355

20 MHz

30 kHz

835.65 MHz

880.65 MHz

849.97 MHz

893.97MHz

f(c) = 825,000 + 30×(channel number) kHz <- uplink f(c) = f uplink + 45,000 kHz <- downlink In general all systems use some form of FDMA

Page 9: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Time Division Multiple Access 9

time

freq

uenc

y

frame slot

Page 10: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

TDMA 10

¨  Users share same frequency band in non-overlapping time intervals, ¤  E.g. Round robin

¨  Receiver filters are just windows instead of bandpass filters (as in FDMA)

¨  Guard time can be as small as the synchronization of the network permits ¤ All users must be synchronized with base station to within a

fraction of guard time ¤ Guard time of 30-50 μs common in TDMA

¨  Used in GSM, NA-TDMA, (PDC) Pacific Digital Cellular

Page 11: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

GSM - TDMA/FDMA/FDD 11

1 2 3 4 5 6 7 8

higher GSM frame structures

935-960 MHz 124 channels (200 kHz) downlink

890-915 MHz 124 channels (200 kHz) uplink

time

GSM TDMA frame

GSM time-slot (normal burst)

4.615 ms

546.5 µs 577 µs

tail user data Training S guard space S user data tail

guard space

3 bits 57 bits 26 bits 57 bits 1 1 3

Page 12: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

TDD/TDMA - example 12

1 2 3 11 12 1 2 3 11 12

t downlink uplink

417 µs

CT2 cordless phone standard

Page 13: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Code Division Multiple Access 13

time

frequency

code

Page 14: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

CDMA 14

¨  Narrowband message signal is multiplied by very large bandwidth spreading signal using direct sequence spread spectrum

¨  All users can use same carrier frequency and may transmit simultaneously

¨  Each user has own unique access spreading codeword which is approximately orthogonal to other users codewords

¨  Receiver performs time correlation operation to detect only specific codeword, other users codewords appear as noise due to decorrelation.

Page 15: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

DSSS Modulation

¨  The original data stream is “chipped” up into a pattern of pulses of smaller duration

¨  Good autocorrelation properties

¨  Good cross-correlation properties with other patterns

¨  Each pattern is called a spread spectrum code or spread spectrum sequence ¤  E.g. Walsh Code

15

Data Bit

“Spread” Bits

chip

1 2 3 4 5 6 7 8 9 10 11

Periodic Spreading Code

Data In

Spreading Code In

normalized frequency -10 -8 -6 -4 -2 0 2 4 6 8 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1original spectrumspread spectrum

Page 16: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Simple example illustrating CDMA

¨  Traditional ¨  To send a 0, send +1 V for T seconds ¨  To send a 1, send -1 V for T seconds ¨  Use separate time slots or frequency bands

to separate signals

¨  Simple CDMA ¨  To send a 0, Bob sends +1 V for T seconds;

Alice sends +1 V for T/2 seconds and -1 V for T/2 seconds

¨  To send a 1, Bob sends -1 V for T seconds; Alice sends -1 V for T/2 seconds and +1 V for T/2

16

1 0 1

[1, 1] [-1, -1] [1, -1] [-1, 1] Code

chip

T T T T

1 1

time

V

Data

0

Page 17: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Simple CDMA Transmitter 17

Spread

Spread

User 1 data in

User 2 data in

0 0 1 1

1 0 1 0

= [1, 1, 1, 1, -1, -1, -1, -1]

= [-1, 1, 1, -1, -1, 1, 1, -1]

Transmitted signal

t

V

V

t

t

V

T 2T 3T 4T

T 2T 3T 4T

T 2T 3T 4T

1

1

2

Page 18: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Simple CDMA Receiver 18

Despread

Despread

User 1 data out

User 2 data out

Received signal t

V

correlate with [1, 1]

correlate with [1, -1]

t

V Alice’s Code =

∫ = -2 x T/2 = -T

-T has a negative sign ⇒  Alice sent a 1 as the first bit

T 2T 3T 4T

T 2T 3T 4T

2

1

Page 19: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Simple CDMA continued 19

¨  Proceeding in this fashion for each “bit”, the information transmitted by Alice can be recovered

¨  To recover the information transmitted by Bob, the received signal is correlated bit-by-bit with Bob’s code [1,1]

¨  Such codes are “orthogonal” ¤  Multiply the codes element-wise (dot product)

n  [1,1] × [1,-1] = [1,-1] ¤  Add the elements of the resulting product

n  1 + (-1) = 0 => the codes are orthogonal

¨  CDMA used in IS-95 standard and both 3G standards: UMTS, cdma2000

¨  CDMA has big capacity advantage as frequency reuse cluster size = 1

Page 20: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Orthogonality 20

¨  Orthogonality important ¤  High autocorrelation (dot product with itself should be

high) ¤  Low cross-correlation (dot product with other codes ≈

0). ¨  Barker codes – [1, -1, 1,1, -1,1,1,1,-1,-1,-1] has

these properties. ¤  Product of Barker code with a shifted version has low

value. ¤ Typically used for synchronization in CDMA systems.

Page 21: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Impact of noise 21

¨  The decoding should be possible even if there is noise.

¨  Note that if there is too much noise, the decorrelation could yield erroneous results.

¨  Similarly if one signal is much stronger than the other, decorrelation could yield erroneous results. ¤  Near far problem.

Page 22: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

CDMA Properties: Near-Far Problem

¨  A CDMA receiver cannot successfully de-spread the desired signal in a high multiple-access-interference environment

¨  Unless a transmitter close to the receiver transmits at power lower than a transmitter farther away, the far transmitter cannot be heard

¨  Power control must be used to mitigate the near-far problem

¨  Mobiles transmit at such power levels to ensure that received power levels are equal at base station

¨  Power control and channel problems!

22

Base station

Page 23: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Random access protocols 23

¨  ALOHA ¤ Transmit whenever you want

n  If you are acknowledged, everything is fine n Otherwise retransmit packets

¤ Low throughput (18%) ¤ Slotted versions are slightly better

n Transmission attempts can take place only at discrete points of time

Page 24: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Use of ALOHA in Cellular Networks 24

¨  To set up a call, MSs initially employ slotted ALOHA to send some information to the BS ¤ Called “random access channel” or something similar

¨  If successful, they are “assigned” a frequency channel and time slot or spread-spectrum code

¨  If unsuccessful, they try again ¤ MS gives up if repeated tries fail

n Collisions (congestion), poor channel quality, etc.

Page 25: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Packet Reservation Multiple Access (PRMA)

25

¨  Implicit reservations. ¨  Base station indicates which slots are free in a

frame. (e.g. in the figure 7th slot is free) ¨  Stations contend for free slot using Aloha.

•  If successful, they hold onto the slot. •  If collision occurs, the slot is open again for contention.

Page 26: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Reservation TDMA 26

¨  Mini-slots at the beginning of the frame – each slot assigned to a station. ¤  These slots are used to reserve data slots (upto some

maximum number)

¨  Unused data slots can be used by other stations. ¤ Assignment could be round robin or using Slotted Aloha.

Page 27: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Carrier Sensing 27

¨  Carrier sensing ¤  It is an improvement of ALOHA (no carrier sensing in

ALOHA) ¤ Depending on the protocol a variety of CSMA protocols

exist n  Non-persistent n  p-persistent n  Binary exponential back-off

¤ Collision detection Vs Collision avoidance

¨  Most random access protocols are based on some form of carrier sensing!

Page 28: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Problems with carrier sensing 28

¨  The signal strength is a function of distance and location ¤ Path loss and shadow fading ¤ Not all terminals at the same distance from a

transmitter can “hear” the transmitter and vice versa

¨  The hidden node problem ¨  The exposed node problem ¨  Capture

Page 29: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

The Hidden Terminal Problem

¨  A MS that is within the range of the destination but out of range of a transmitter

¨  MS A transmits to the AP

¨  MS B cannot sense the signal ¤  MS B may also transmit

resulting in collisions ¤  MS B is called a “hidden

terminal” with respect to MS A

29

AP

Communication is not possible Signal is not sensed

A

B

range of B

range of A

Page 30: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Mechanisms for overcoming collisions due to hidden terminals

30

¨  Busy-tone multiple access (BTMA) ¤  Out of band signaling scheme ¤  Any node that hears a transmission will transmit a busy tone in an

out of band channel ¤  Also called Inhibit Sense Multiple Access (see book).

¨  Control handshaking ¤  Use a three-way handshake ¤  Terminal A sends a short request-to-send (RTS) packet to the AP ¤  The AP sends a short clear-to-send (CTS) packet that is received

by Terminal A AND Terminal B ¤  Terminal B defers to terminal A

Page 31: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Exposed Terminal Problem 31

¨  Opposite of hidden terminals ¨  The exposed terminal is in the range of the

transmitter but outside the range of the destination ¨  Terminals may unnecessarily backoff

¤  Low utilization of bandwidth ¨  Solutions

¤ Proper frequency planning ¤  Intelligent thresholds for carrier sensing

Page 32: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Capture 32

¨  Capture ¤  A receiver can “cleanly” receive a signal from one of many simultaneous

transmissions

¨  Suppose MS-A, MS-B and MS-3 all simultaneously transmit to an AP with the same transmit power ¤  MS-A is the closest and its signal is received with a larger strength

obscuring the transmissions from MS-B and MS-C ¤  The AP is said to have “captured” the signal from MS-A ¤  Common in FM or FSK transmissions but not a big problem in other

systems

¨  Capture improves the throughput ¨  Capture results in unfair sharing of bandwidth

¤  Need protocols to ensure fairness

Page 33: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Problems with Collision Detection 33

¨  Collision detection is easier at baseband than at RF frequencies ¤  Receive and transmit frequencies are the same

n  There is a significant leakage of the transmitted signal onto the receiver antenna – “self interference”

n  Transmitting and receiving at the same time is very hard ¤  Receive and transmit frequencies are different

n  Circuitry cost and power consumption become prohibitive for collision detection by a MS

¤  Transmissions from ground level can be detected at a tower but not at the ground level

¤  Collision results in a significant shift in voltage that is detected – fades could obscure this shift

Page 34: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Collision avoidance mechanisms 34

¨  Waiting times before transmission ¤  If the MS finds the channel idle, it still waits for a fixed amount of time

before transmitting

¨  Random backoff upon detecting a busy channel ¤  Randomness reduces the chance of two MSs transmitting at the same

time ¨  Contention resolution mechanisms

¤  Use windows where a MS asserts itself or yields to other MS based on several different protocols

¤  Randomly addressed polling (uses CDMA) ¨  Idle sensing at the BS/AP

¤  If the uplink and downlink transmissions are separated in frequency, the busy nature of the uplink is communicated to the MSs by the BS/AP

Page 35: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

The HIPERLAN/1 MAC Protocol 35

¨  It is based on carrier sensing, but of a type unlike IEEE 802.3 or IEEE 802.11

¨  It is called EY-NPMA: Elimination Yield Non-preemptive Priority Multiple Access

¨  The idea is to make the probability of a “single” transmission at the end of the contention cycle as close to 1 as possible.

¨  Section 7.4.1 in book.

Page 36: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

The MAC Protocol Continued 36

¨  If a MS senses a medium to be free for at least 1700 bit durations, immediate transmission is allowed ¤  Each data frame MUST be acknowledged by an ACK

¨  Otherwise, the MS goes through two phases once the medium becomes idle: ¤  Prioritization ¤  Contention

n  Elimination n  Yield

¤ Transmission

Page 37: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Prioritization 37

¨  Determine the highest priority of a data to be sent by competing MSs ¨  Allow only those stations with high priority frames to contend for the

channel ¨  Data packets have several types of priorities

¤  5 priorities with Hiperlan

¨  A node with priority p will listen to p-1 time slots (usually 1 to 5 slots of 256 bits each) ¤  If the medium is idle after the (p-1)-st slot, the MS will send a burst of

256 bits asserting its priority ¤  If the medium becomes busy with a burst any time before, the MS will

defer to the next transmission cycle

¨  Many MSs may have the same priority, but the ones with low priority are eliminated from contention

Page 38: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Contention (Elimination) 38

¨  Slots of size 256 bits are defined ¨  Randomly, MSs select the number of slots for which they will send a

burst continously ¨  The maximum number of slots is 12 ¨  The probability of the burst being “n” slots is (p is usually 0.5)

¤  pn (1-p) for n < 12 ¤  pn for n = 12

¨  After sending a burst, a MS listens to the channel for 256 bit durations (elimination survival verification interval)

¨  If it hears a burst in this period, it eliminates itself ¨  Longest burst wins!

Page 39: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Contention (Yield) 39

¨  The remaining MSs have a random yield period ¨  Each MS will “listen” to the channel for the duration of its

yield period which is geometrically distributed ¤  Prob (listening to n slots) = 0.9n 0.1 for n < 14 and 0.914 for

n=14

¨  If a MS senses the channel to be idle for the entire yield period, it has survived <whew!!> ¤  Shortest Idle period wins

¨  It will start transmitting data and will automatically eliminate other MSs that are listening to the channel

Page 40: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Channel Access Cycle in HIPERLAN 40

Cycle Synch. Interval

Prioritization Phase

Priority detection

Priority Assertion

(PA)

Contention Phase

Elimination Burst

Elimination Survival Verification

Yield Phase

Yield Listening

Data Transmission

Frame

ACK

Page 41: LECTURE 4kapic001/teaching/files/Lecture4-CS169.pdfLECTURE 4 Medium Access Control 1 Introduction 2 ! What is medium access? ! Who gets to transmit? How? When? ! Multiplexing " How

Summary 41

¨  If simplicity demands a decentralized medium access protocol, CSMA or any of its variants is preferred

¨  CSMA in wireless networks leads to the hidden terminal, exposed terminal and sometimes the capture problem

¨  Collision detection in wireless networks is extremely difficult

¨  Systems that use CSMA are ¤  CDPD ¤  IEEE 802.11 ¤  HIPERLAN/1