• 21.5.4 IEEE 802.11 Medium Access Control
  • Wireless Local Area Networks




    Download 343,31 Kb.
    Pdf ko'rish
    bet21/55
    Sana24.05.2024
    Hajmi343,31 Kb.
    #252539
    1   ...   17   18   19   20   21   22   23   24   ...   55
    Bog'liq
    garg2007

    21.5 IEEE 802.11 WLAN 
    735
    Ch21-P373580.indd 735
    5/3/07 10:58:23 PM


    736 
    21 Wireless Local Area Networks
    above MAC is the LLC, where the framing takes place. The LLC inserts certain 
    fi elds in the frame such as the source address and destination address at the head 
    end of the frame and error handling bits at the end of the frame. 
    The 802.11 MAC is similar in concept to 802.3, in that it is designed to 
    support multiple users on a shared medium by having the sender sense the medium 
    before accessing it. For the 802.3 Ethernet LAN, the carrier sense multiple access 
    with collision detection (CSMA/CD) protocol regulates how Ethernet stations 
    establish access to the network and how they detect and handle collisions that 
    occur when two or more devices try to simultaneously communicate over the 
    LAN. In an 802.11 WLAN, collision detection is not possible due to the 
    near/far
    problem (see Chapter 11). To detect a collision, a station must be able to transmit 
    and listen at the same time, but in radio systems the transmission drowns out the 
    ability of a station to hear a collision.
    21.5.4 IEEE 802.11 Medium Access Control
    Wireless local area networks operate using a shared, high bit rate transmission 
    medium to which all devices are attached and information frames relating to all 
    calls are transmitted. MAC sublayer defi nes how a user obtains a channel when 
    he or she needs one. 
    MAC schemes include random access, order access, deterministic access, and 
    mixed access. The random access MAC protocols are: ALOHA (asynchronous, 
    slotted), carrier-sense multiple-access (CSMA) (CSMA/collision-detection (CD), 
    CSMA/collision-avoidance (CA), non-persistent, and p-persistent). The maxi-
    mum throughput of slotted ALOHA protocol is about 36% of the data rate of 
    the channel (see Chapter 5). It is simple, but not very effi cient. Most WLANs 
    implement a random access protocol, CSMA/CA with some modifi cation, to deal 
    with the 
    hidden node
    problem. The CSMA peaks at about 60%. When the traffi c 
    becomes heavy, it degrades badly. The way of dealing with that situation is to use 
    p-persistent. Most mobile data networks also use random access protocol, usually 
    one that is simpler than CSMA, namely slotted ALOHA. Table 21.10 provides a 
    comparison of MAC schemes for wireless networks.
    Deterministic MAC schemes improve throughput and response time when 
    traffi c is heavy. They offer the guaranteed bandwidth for isochronous traffi c. 
    In mixed cases such as CSMA/TDMA, the frame is divided into a random access 
    part and a reserved part. When the traffi c is light, it is left to be mostly random. 
    When the traffi c is heavy and throughput is in danger of declining or if a node 
    requires isochronous bandwidth, the control point allocates bandwidth determin-
    istically. CSMA/TDMA approaches CSMA performance under light traffi c, so it 
    has fast access time. It approaches TDMA performance when the traffi c becomes 
    heavy, so its throughput can rise close to 100% of the data rate.
    IEEE 802.11 uses a modifi ed protocol known as 
    carrier sense multiple access 
    with collision avoidance 
    (
    CSMA/CA
    ) or distributed coordination function (DCF). 
    Ch21-P373580.indd 736
    5/3/07 10:58:24 PM


    CSMA/CA attempts to avoid collisions by using 
    explicit packet acknowledgment
    (ACK), which means an ACK packet is sent by the receiving station to confi rm 
    that the data packet arrived intact. 
    The CSMA/CA protocol is very effective when the medium is not heav-
    ily loaded since it allows stations to transmit with minimum delay. But there is 
    always a chance of stations simultaneously sensing the medium as being free and 
    transmitting at the same time, causing a collision. These collisions must be identi-
    fi ed so that the MAC layer can retransmit the packet by itself and not by the upper 
    layers, which would cause signifi cant delay. In the Ethernet with CSMA/CD the 
    collision is recognized by the transmitting station, which goes into a retransmis-
    sion phase based on an exponential random backoff algorithm. While these colli-
    sion detection mechanisms are a good idea on a wired LAN, they cannot be used 
    on a WLAN environment for two main reasons:
    Implementing a collision detection mechanism would require the implemen-
    tation of a full duplex radio capable of transmitting and receiving at the 
    same time, an approach that would increase the cost signifi cantly.
    In a wireless environment we cannot assume that all stations hear each 
    other (which is the basic assumption of the collision detection scheme), and 
    the fact that a station wants to transmit and senses the medium as free does 
    not necessarily mean that the medium is free around the receiver area.
    To overcome these problems, the 802.11 uses a CA mechanism together 
    with a positive ACK. The MAC layer of a station wishing to transmit senses the 
    medium. If the medium is free for a specifi ed time, called 
    distributed inter-frame 
    space 
    (DIFS), then the station is able to transmit the packet; if the medium is 



    Download 343,31 Kb.
    1   ...   17   18   19   20   21   22   23   24   ...   55




    Download 343,31 Kb.
    Pdf ko'rish