Introduction
802.11 MAC sub-layer protocol is quite different from that of Ethernet due to the inherent complexity of the wireless environment compared to that of a wired system. With Ethernet, a station just waits until the ether goes silent and starts transmitting. If it does not receive a noise burst back, the frame has almost assuredly been delivered correctly. With wireless, this situation does not hold.
Introduction
The challenges are: 1) The wireless LAN is prone to more interference and is less reliable. 2) The wireless LAN is susceptible to unwanted interception leading to security problems. 3) There are so called hidden station and exposed station problems.
802.11 MAC
To deal with this problem, 802.11 supports two modes of operation. The first, called DCF (Distributed Coordination Function), does not use any kind of central control (in that respect, similar to Ethernet). The other, called PCF (Point Coordination Function), uses the base station to control all activity in its cell. All implementations must support DCF but PCF is optional.
802.11 MAC
DCF is employed, 802.11 uses a protocol called CSMA/CA (CSMA with Collision Avoidance). In this protocol, both physical channel sensing and virtual channel sensing are used. Two methods of operation are supported by CSMA/CA. In the first method, when a station wants to transmit, it senses the channel. If it is idle, it just starts transmitting.
802.11 MAC
It does not sense the channel while transmitting but emits its entire frame, which may well be destroyed at the receiver due to interference there. If the channel is busy, the sender defers until it goes idle and then starts transmitting. If a collision occurs, the colliding stations wait a random time, using the Ethernet binary exponential back-off algorithm, and then try again later. The other mode of CSMA/CA operation is based on MACAW and uses virtual channel sensing
MACA
Fragment burst
In contrast to wired networks, wireless networks are noisy and unreliable To deal with the problem of noisy channels, 802.11 allows frames to be fragmented into smaller pieces, each with its own checksum. The fragments are individually numbered and acknowledged using a stop-and-wait protocol Once the channel has been acquired using RTS and CTS, multiple fragments can be sent in a row, sequence of fragments is called a fragment burst.
Fragment burst
Fragmentation increases the throughput by restricting retransmissions to the bad fragments rather than the entire frame. The fragment size is not fixed by the standard but is a parameter of each cell and can be adjusted by the base station. The NAV mechanism keeps other stations quiet only until the next acknowledgement, These all are part of DCF
Inter-frame spacing
PCF and DCF can coexist within one cell. At first it might seem impossible to have central control and distributed control operating at the same time, but 802.11 provides a way to achieve this goal. It works by carefully defining the interframe time interval. After a frame has been sent, a certain amount of dead time is required before any station may send a frame. Four different intervals are defined, each for a specific purpose.
Inter-frame spacing
Introduction
A network of computers based on multi-access medium requires a protocol for effective sharing of the media. As only one node can send or transmit signal at a time using the broadcast mode, The main problem here is how different nodes get control of the medium to send data, that is who goes next?. The protocols used for this purpose are known as Medium Access Control (MAC) techniques.
Introduction
The key issues involved here are - Where and How the control is exercised. Where refers to whether the control is exercised in a centralized or distributed manner. In a centralized system a master node grants access of the medium to other nodes.
Introduction
A centralized scheme has a number of advantages as mentioned below: Greater control to provide features like priority, overrides, and guaranteed bandwidth. Simpler logic at each node. Easy coordination. This approach is easier to implement, it is vulnerable to the failure of the master node and reduces efficiency
Introduction
On the other hand, in a distributed approach all the nodes collectively perform a medium access control function and dynamically decide which node to be granted access. This approach is more reliable than the former one. How refers to in what manner the control is exercised. It is constrained by the topology and trade off between cost-performance and complexity.
Goals of MACs
Medium Access Control techniques are designed with the following goals in mind. Initialization Fairness Priority Limitation to one station Receipt Error Limitation Recovery Recofigurability Compatibility Reliability
Goals of MACs
Initialization: The technique enables network stations, upon power-up, to enter the state required for operation. Fairness: The technique should treat each station fairly in terms of the time it is made to wait until it gains entry to the network, access time and the time it is allowed to spend for transmission. Priority: In managing access and communications time, the technique should be able to give priority to some stations over other stations to facilitate different type of services needed.
Goals of MACs
Limitations to one station: The techniques should allow transmission by one station at a time. Receipt: The technique should ensure that message packets are actually received (no lost packets) and delivered only once (no duplicate packets), and are received in the proper order. Error Limitation: The method should be capable of encompassing an appropriate error detection scheme. Recovery: If two packets collide (are present on the network at the same time), or if notice of a collision appears, the method should be able to recover, i.e. be able to halt all the transmissions and select one station to retransmit.
Goals of MACs
Reconfigurability: The technique should enable a network to accommodate the addition or deletion of a station with no more than a noise transient from which the network station can recover. Compatibility: The technique should accommodate equipment from all vendors who build to its specification. Reliability: The technique should enable a network to confine operating inspite of a failure of one or several stations.
The traditional way of allocating a single channel, such as a telephone trunk, among multiple competing users is Frequency Division Multiplexing (FDM). If there are N users, the bandwidth is divided into N equalsized portions , each user being assigned one portion. Since each user has a private frequency band, there is no interference between users. When there is only a small and constant number of users, each of which has a heavy (buffered) load of traffic (e.g., carriers' switching offices), FDM is a simple and efficient allocation mechanism.
Station Model
The model consists of N independent stations, each with a program or user that generates frames for transmission. Stations are sometimes called terminals. The probability of a frame being generated in an interval of length t is t, where is a constant . Once a frame has been generated, the station is blocked and does nothing until the frame has been successfully transmitted
All stations can transmit on it and all can receive from it.
As far as the hardware is concerned, all stations are equivalent, although protocol software may assign priorities to them.
Collision Assumption.
If two frames are transmitted simultaneously, they overlap in time and the resulting signal is garbled. This event is called a collision. All stations can detect collisions. A collided frame must be transmitted again later. There are no errors other than those generated by collisions.
Continuous Time.
Frame transmission can begin at any instant. There is no master clock dividing time into discrete intervals.
Slotted Time.
Time is divided into discrete intervals (slots). Frame transmissions always begin at the start of a slot. A slot may contain 0, 1, or more frames, corresponding to an idle slot, a successful transmission, or a collision, respectively.
Carrier Sense.
Stations can tell if the channel is in use before trying to use it. If the channel is sensed as busy, no station will attempt to use it until it goes idle.
No Carrier Sense.
Stations cannot sense the channel before trying to use it. They just go ahead and transmit. Only later can they determine whether the transmission was successful.