Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27,...

30
Broadband Wireless Broadband Wireless Media Access Control Media Access Control From 802.11 to 802.16 From 802.11 to 802.16 Justin Comroe Justin Comroe ASU CSE 535 ASU CSE 535 Nov 27, 2007 Nov 27, 2007

Transcript of Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27,...

Page 1: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Broadband WirelessBroadband WirelessMedia Access ControlMedia Access ControlFrom 802.11 to 802.16From 802.11 to 802.16

Justin ComroeJustin Comroe

ASU CSE 535ASU CSE 535

Nov 27, 2007Nov 27, 2007

Page 2: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

WiFi Today at ASUWiFi Today at ASU

WiFi is used in-buildings as IEEE 802.11 was WiFi is used in-buildings as IEEE 802.11 was originally designed, as a wireless LANoriginally designed, as a wireless LAN

WiFi is also being used outdoors as a MAN right WiFi is also being used outdoors as a MAN right now at ASU and many places around the nationnow at ASU and many places around the nation

IEEE has completed development of a new IEEE has completed development of a new standard for outdoor MANstandard for outdoor MAN IEEE 802.16 has departed dramatically from the well-IEEE 802.16 has departed dramatically from the well-

known & used 802.11 techniques for MACknown & used 802.11 techniques for MAC

So what’s wrong with the 802.11 MAC for outdoor applications, especially when everyone is using it and we already know it works?

So what’s wrong with the 802.11 MAC for outdoor applications, especially when everyone is using it and we already know it works?

Page 3: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Collisions KillCollisions Kill

WiFi is basically a wireless EthernetWiFi is basically a wireless Ethernet The Medium is radioThe Medium is radio A fundamental A fundamental MMedium edium AAccess ccess CControl (ontrol (MACMAC) )

function is to prevent transmissions from function is to prevent transmissions from collidingcolliding when a station transmission overlaps another, one or when a station transmission overlaps another, one or

both transmissions will often failboth transmissions will often fail Without collision control >81.6% of total airtime Without collision control >81.6% of total airtime

is wastedis wasted Pure ALOHA maximum throughput is only 18.4%Pure ALOHA maximum throughput is only 18.4%

Page 4: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Collisions KillCollisions KillTransmission 1

Transmission 2

Transmission 1 Transmission 2x

timeDestructive interference at destination

Wasted airtime

Page 5: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

IEEE 802.11 MACIEEE 802.11 MAC

Stations listen to all transmissions and Stations listen to all transmissions and transmit when the channel appears idletransmit when the channel appears idle This is This is CCarrier arrier SSense ense MMultiple ultiple AAccess, or ccess, or CSMACSMA

CSMA CSMA works a lot better than Aloha for all cases works a lot better than Aloha for all cases where all the stations can hear each other.where all the stations can hear each other.

Source for following material on 802.11:IEEE P802.11-96/49C“802.11 Tutorial”, from March 1996http://grouper.ieee.org/groups/802/11/Tutorial/MAC.pdfThis is IEEE’s official website for the 802.11 taskgroup

Source for following material on 802.11:IEEE P802.11-96/49C“802.11 Tutorial”, from March 1996http://grouper.ieee.org/groups/802/11/Tutorial/MAC.pdfThis is IEEE’s official website for the 802.11 taskgroup

Page 6: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Carrier Sense – Basic PrincipleCarrier Sense – Basic PrincipleTransmission 1

Transmission 2

Transmission 1

Transmission 2

timeLaptop 2 “hears” Laptop1 transmission

1

2

… and waits until done before transmitting

3

[1]->[3]

[2]->[3]

Page 7: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

IEEE 802.11 MACIEEE 802.11 MAC

802.11 further adds several methods meant for 802.11 further adds several methods meant for CCollision ollision AAvoidancevoidance IEEE 802.11 MAC is described as IEEE 802.11 MAC is described as CSMA/CACSMA/CA

802.11 has a MAC rule to preventing overlap, 802.11 has a MAC rule to preventing overlap, called the called the DDistributed istributed CCoordination oordination FFunction, or unction, or DCFDCF

Page 8: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

DDistributed / istributed / SShort hort IInternterFFrame rame SSpacepaceand Backoff Intervaland Backoff Interval

Transmission 1

Transmission 2

time

A device wanting to transmit during Idle channel must first see a minimum DIFS interval

A device wanting to transmit during a transmission-in-progress must wait an additional randomly selected number of slot times forming a Backoff Interval

DIFS

AckSIFS

The receiving unit gets to Acknowledge after an SIFS which is < DIFS

DIFS

[1]->[3]

[2]->[3]

[3]->[1]

Deferredaccess

Page 9: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

NAVNAV

Transmission 1

Transmission 2

timeLaptop 2 doesn’t “hears” end of Laptop1 transmission

… but still waits until done before transmitting because of NAV

NA

V

NA

V

Under DCF, each unit places a Under DCF, each unit places a NNetwork etwork AAllocation llocation VVector (ector (NAVNAV) in front of each transmission) in front of each transmission identifies the length of its transmission identifies the length of its transmission

Page 10: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Hidden NodeHidden Node

Transmission 1Transmission 21 2

3

Presume [1] and [2] can both hear [3] and vice-versa,But [1] and [2] cannot hear each other.

Transmission 1Transmission 2

time

DIFS

[1]->[3][2]->[3]

DIFS

x

Destructive interference at [3]

Page 11: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

RequestToSend / ClearToSendRequestToSend / ClearToSend

Transmission 1

time

DIFSAck

Every transmission can begin with an RTS, which is responded to with a CTS. Transmission and Ack follow the RTS/CTS exchange. Further, the NAV values project enough time for the entire transaction to complete.

[1]->[3]

[3]->[1]NA

V RTS

NA

V CTS

[1]->[3]

[3]->[1] NA

V

NA

V

Even if unit [2] does not hear the RTS from [1]->[3], hearing the NAV preceding the CTS from [3] would defer access until the end of the entire transaction!

Page 12: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

802.11 MAC Summary802.11 MAC Summary

All devices independently pick their own time to All devices independently pick their own time to transmittransmit There is no central authority … There is no central authority … DDCF stands for CF stands for

““DistributedDistributed””

DIFS, SIFS, Backoff Intervals … and DIFS, SIFS, Backoff Intervals … and mainly mainly collisionscollisions … all subtract from airtime that could … all subtract from airtime that could successfully deliver payloadsuccessfully deliver payload As more units compete, collisions increaseAs more units compete, collisions increase As collisions increase, capacity goes downAs collisions increase, capacity goes down Therefore capacity goes down as more units competeTherefore capacity goes down as more units compete

Page 13: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

MAN CoverageMAN Coverage

This is not a Peer-Peer NetworkThis is not a Peer-Peer Network Units only transmit to Access PointUnits only transmit to Access Point The access point has a physically dominant locationThe access point has a physically dominant location

All units can see the access pointAll units can see the access point Each unit might at best see only a few nearby unitsEach unit might at best see only a few nearby units

Page 14: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

MAN usage of 802.11MAN usage of 802.11

Violates primary DCF assumptionsViolates primary DCF assumptions Units cannot hear other unitsUnits cannot hear other units

• NAV cannot function when a peer user NAV cannot function when a peer user transmission is never heardtransmission is never heard

• CSMA and CA both break downCSMA and CA both break down Hidden Node CA doesn’t work either even if Hidden Node CA doesn’t work either even if

employing RTS/CTSemploying RTS/CTS• Mobile initiated RTS never heard by other mobilesMobile initiated RTS never heard by other mobiles• CSMA and CA both break downCSMA and CA both break down

Page 15: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

CSMA Breaks DownCSMA Breaks Down

When an access point has too many When an access point has too many users, to the non-engineering user it users, to the non-engineering user it simply appears to stop workingsimply appears to stop working

The engineering observer might presume The engineering observer might presume that capacity is simply being dividedthat capacity is simply being divided

The truth is, when an access point has too The truth is, when an access point has too many users, the capacity actually goes to many users, the capacity actually goes to zero, just as simple ALOHA when zero, just as simple ALOHA when overloadedoverloaded

Page 16: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Full DisclosureFull Disclosure

A handful of companies specifically create A handful of companies specifically create 802.11 based MAN products, but they often alter 802.11 based MAN products, but they often alter the 802.11 MAC (like Alvarion)the 802.11 MAC (like Alvarion)

Virtually all 802.11 uses Virtually all 802.11 uses DDCF, meaning CF, meaning DistributedDistributed

There is a relatively unutilized mode of 802.11 There is a relatively unutilized mode of 802.11 called called PCFPCF ( (Point Configuration FunctionPoint Configuration Function)) PCF permits the Access Point to control accessPCF permits the Access Point to control access PCF is useful for polling applicationsPCF is useful for polling applications

Page 17: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

IEEE MAN Standard Takes a IEEE MAN Standard Takes a Radically Different DirectionRadically Different Direction

IEEE 802.16 designed to be a MAN, not a IEEE 802.16 designed to be a MAN, not a LANLAN

Source for following material on 802.16:IEEE C802.16-02/05Ecklund, Marks, Stanwood, & Wang, “IEEE Standard 802.16: A Technical Overview of the WirelessMAN Air Interface for Broadband Wireless Access”, IEEE Communications Magazine, June 2002, pp.98-107http://grouper.ieee.org/groups/802/16/docs/02/C80216-02_05.pdf This is IEEE’s official website for the 802.16 taskgroup

Source for following material on 802.16:IEEE C802.16-02/05Ecklund, Marks, Stanwood, & Wang, “IEEE Standard 802.16: A Technical Overview of the WirelessMAN Air Interface for Broadband Wireless Access”, IEEE Communications Magazine, June 2002, pp.98-107http://grouper.ieee.org/groups/802/16/docs/02/C80216-02_05.pdf This is IEEE’s official website for the 802.16 taskgroup

Page 18: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

IEEE 802.16 FundamentalsIEEE 802.16 Fundamentals

Not a LAN … Not a LAN … not Peer-Peer basednot Peer-Peer based Instead: Access Point central control Instead: Access Point central control

(point-multipoint)(point-multipoint)

No contention … No contention … for Payloadfor Payload Instead: request/grant based schedulingInstead: request/grant based scheduling

Page 19: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Contention MACContention MAC

802.11 is like a 802.11 is like a meeting, where meeting, where anyone can talk at anyone can talk at any timeany time

DCF rules are like DCF rules are like manners, manners, recognizing who is recognizing who is currently speaking currently speaking and being politeand being polite

Too many people, and everyone tries to speak-up with people talking over each-other

Too many people, and everyone tries to speak-up with people talking over each-other

Page 20: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Scheduled MACScheduled MAC

802.16 Request/Grant is like a classroom 802.16 Request/Grant is like a classroom controlled by a teachercontrolled by a teacher

Students are not allowed to talk until they Students are not allowed to talk until they raise their hand and are CALLED ON by raise their hand and are CALLED ON by the teacherthe teacher

Collisions can’t happenCollisions can’t happen

Page 21: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Requests – Almost The Only Requests – Almost The Only Contention in 802.16Contention in 802.16

A regular time is set-aside every 0.5 msec to A regular time is set-aside every 0.5 msec to 2msec for any Student (user) to raise their hand 2msec for any Student (user) to raise their hand (request access)(request access)

If the Teacher (Access Point) hears the request, If the Teacher (Access Point) hears the request, they are called upon (sent a Grant)they are called upon (sent a Grant) If their request collides (no grant) they request again If their request collides (no grant) they request again

in a following slotin a following slot

Users select a random position within the Users select a random position within the available request times, and the system can available request times, and the system can allocate enough request time to insure it’s never allocate enough request time to insure it’s never overloadedoverloaded

Page 22: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Registration – The Other Registration – The Other Contention in 802.16Contention in 802.16

Students may ENTER or EXIT at any timeStudents may ENTER or EXIT at any time Entering students must make their presence Entering students must make their presence

knownknown Since students may exit without notice, all Since students may exit without notice, all

present students must periodically confirm their present students must periodically confirm their presencepresence

enter

exit

Page 23: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

FramingFraming

The channel is divided into repeated Uplink/Downlink time-frames The channel is divided into repeated Uplink/Downlink time-frames by the Access Pointby the Access Point

Frame rate is system defined to be 0.5msec, 1msec, or 2msec in Frame rate is system defined to be 0.5msec, 1msec, or 2msec in lengthlength

DL UL DL UL DL UL

Both TDD (single channel) and FDD (separate UL & DL Both TDD (single channel) and FDD (separate UL & DL frequencies) are standardizedfrequencies) are standardized

DL

UL

DL

UL

DL

UL

DL

UL

DL

UL

DL

UL

TDD Format

FDD Format

Single channelSeparate UL & DL channels

Page 24: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

When / Where is the Contention?When / Where is the Contention?

Contention is allocated Contention is allocated pre-defined subframes pre-defined subframes within any/every UL within any/every UL FrameFrame

Units randomly pick a Units randomly pick a sub-slot within an Initial sub-slot within an Initial Maintenance Opportunity Maintenance Opportunity slot to registerslot to register

Units randomly pick a Units randomly pick a sub-slot within a Request sub-slot within a Request Contention Opportunity to Contention Opportunity to request servicerequest service

DL UL DL UL DL UL

IMO RCO SD SD SD

Each Uplink Frame

802.16 Channel Frames

Scheduled Data slots

Initial Maintenance Opportunities

Request Contention Opportunities

Page 25: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Finding the Contention OpportunitiesFinding the Contention Opportunities

All units must locate / All units must locate / lock onto the lock onto the Preamble that starts Preamble that starts every DL frameevery DL frame

The very next frame The very next frame is is BBroadcast roadcast CControl ontrol containing DL & UP containing DL & UP mapsmaps

The UL map identifies The UL map identifies the makeup of the the makeup of the next uplink framenext uplink frame

DL UL DL UL DL UL

Pre BC TDM TDM TDM

Each Downlink Frame

802.16 Channel Frames

Time Division Multiplex slots

Broadcast Control

DLMAP

ULMAP

Page 26: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

RegisteringRegistering

When a unit enters a cell, When a unit enters a cell, the unit locates the next the unit locates the next opportunity from the opportunity from the preceeding frame UL-MAPpreceeding frame UL-MAP

The unit can then transmit a The unit can then transmit a registration on a randomly registration on a randomly selected sub-slot in the next selected sub-slot in the next UL frameUL frame

The unit monitors for an Ack The unit monitors for an Ack in a following DL framein a following DL frame

DL UL DL UL DL UL

RxUL-MAP

Tx Registration

RxAck

Page 27: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Sending DataSending Data

When there is inbound data When there is inbound data to send, the unit locates the to send, the unit locates the next opportunity from the next opportunity from the preceeding frame UL-MAPpreceeding frame UL-MAP

The unit can then transmit a The unit can then transmit a request on a randomly request on a randomly selected sub-slot in the next selected sub-slot in the next UL frameUL frame

The unit monitors for a The unit monitors for a grant in a following DL grant in a following DL frame, and using a new UL-frame, and using a new UL-MAP identifies an assigned MAP identifies an assigned scheduled data slotscheduled data slot

The unit then monitors for The unit then monitors for an Ack in a following DL an Ack in a following DL frameframe

DL UL DL UL DL UL

RxUL-MAP

Tx Request

RxUL-MAPand Grant

Tx Data

RxAck

Page 28: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Bounding ContentionBounding Contention

IEEE 802.16 limits contention to IEEE 802.16 limits contention to registration and service requestsregistration and service requests This is a limited portion of UL FramesThis is a limited portion of UL Frames

Only the shortest control messages Only the shortest control messages contendcontend Registrations & requests basically contain a Registrations & requests basically contain a

unit identity and only a single argumentunit identity and only a single argument Everything else on the channel is Everything else on the channel is

scheduledscheduled ScheduledScheduled means means Contention FreeContention Free

Page 29: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

Scheduling vs CapacityScheduling vs Capacity

Because contention is not permitted when Because contention is not permitted when transmitting payload, payload collision transmitting payload, payload collision does not exist (does not exist (cannot happencannot happen))

Payload capacity is guaranteed regardless Payload capacity is guaranteed regardless of user loadof user load

Capacity trade-off for scheduling is bound Capacity trade-off for scheduling is bound by the amount of channel time allocated to by the amount of channel time allocated to request / grant contention request / grant contention

Page 30: Broadband Wireless Media Access Control From 802.11 to 802.16 Justin Comroe ASU CSE 535 Nov 27, 2007.

SummarySummary

802.11 is a LAN, that is often used as a MAN802.11 is a LAN, that is often used as a MAN 802.11 uses contention with 802.11 uses contention with CCarrier arrier SSense and ense and

CCollision ollision AAvoidance algorithmsvoidance algorithms Neither Neither CSCS nor nor CACA work properly as a MAN work properly as a MAN When overloaded, 802.11 ceases to function when When overloaded, 802.11 ceases to function when

used as a MAN (capacity approaches zero)used as a MAN (capacity approaches zero) A new standard has been developed for MAN A new standard has been developed for MAN

applications (802.16)applications (802.16) 802.16 eliminates the basic shortcoming of 802.16 eliminates the basic shortcoming of

802.11 used as a MAN by eliminating virtually all 802.11 used as a MAN by eliminating virtually all contentioncontention