DOC PREVIEW
U of I CS 438 - Token Rings

This preview shows page 1-2-3-4-5-6-7-50-51-52-53-54-55-56-100-101-102-103-104-105-106 out of 106 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 106 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

10/11/06 CS/ECE 438 - UIUC, Fall 2006 1IEEE 802.11, Token Rings10/11/06 CS/ECE 438 - UIUC, Fall 2006 2Medium Access Control Wireless channel is a shared medium Need access control mechanism toavoid interference Why not CSMA/CD?10/11/06 CS/ECE 438 - UIUC, Fall 2006 3 Listen for carrier sense before transmitting Collision: What you hear is not what you sent!Ethernet MAC AlgorithmNode A Node B10/11/06 CS/ECE 438 - UIUC, Fall 2006 3 Listen for carrier sense before transmitting Collision: What you hear is not what you sent!Ethernet MAC AlgorithmNode A Node B⊗10/11/06 CS/ECE 438 - UIUC, Fall 2006 4CSMA/CD in WLANs? Most (if not all) radios are half-duplex Listening while transmitting is notpossible Collision might not occur at sender Collision at receiver might not bedetected by sender!10/11/06 CS/ECE 438 - UIUC, Fall 2006 5Hidden Terminal ProblemA B CABCA’s signalstrengthspaceC’s signalstrength10/11/06 CS/ECE 438 - UIUC, Fall 2006 5Hidden Terminal Problem Node B can communicate with both A and C A and C cannot hear each other When A transmits to B, C cannot detect thetransmission using the carrier sense mechanism If C transmits, collision will occur at node BA B CABCA’s signalstrengthspaceC’s signalstrength10/11/06 CS/ECE 438 - UIUC, Fall 2006 5Hidden Terminal Problem Node B can communicate with both A and C A and C cannot hear each other When A transmits to B, C cannot detect thetransmission using the carrier sense mechanism If C transmits, collision will occur at node BA B CDATAABCA’s signalstrengthspaceC’s signalstrength10/11/06 CS/ECE 438 - UIUC, Fall 2006 5Hidden Terminal Problem Node B can communicate with both A and C A and C cannot hear each other When A transmits to B, C cannot detect thetransmission using the carrier sense mechanism If C transmits, collision will occur at node BA B CDATA DATAABCA’s signalstrengthspaceC’s signalstrength10/11/06 CS/ECE 438 - UIUC, Fall 2006 5Hidden Terminal Problem Node B can communicate with both A and C A and C cannot hear each other When A transmits to B, C cannot detect thetransmission using the carrier sense mechanism If C transmits, collision will occur at node BA B CDATA DATAABCA’s signalstrengthspaceC’s signalstrength10/11/06 CS/ECE 438 - UIUC, Fall 2006 6MACA Solution for HiddenTerminal Problem When node A wants to send a packet to node B Node A first sends a Request-to-Send (RTS) to A On receiving RTS Node A responds by sending Clear-to-Send (CTS) provided node A is able to receive the packet When a node C overhears a CTS, it keeps quiet for theduration of the transferA B C10/11/06 CS/ECE 438 - UIUC, Fall 2006 6MACA Solution for HiddenTerminal Problem When node A wants to send a packet to node B Node A first sends a Request-to-Send (RTS) to A On receiving RTS Node A responds by sending Clear-to-Send (CTS) provided node A is able to receive the packet When a node C overhears a CTS, it keeps quiet for theduration of the transferRTSA B C10/11/06 CS/ECE 438 - UIUC, Fall 2006 6MACA Solution for HiddenTerminal Problem When node A wants to send a packet to node B Node A first sends a Request-to-Send (RTS) to A On receiving RTS Node A responds by sending Clear-to-Send (CTS) provided node A is able to receive the packet When a node C overhears a CTS, it keeps quiet for theduration of the transferRTSCTSCTSA B C10/11/06 CS/ECE 438 - UIUC, Fall 2006 7Exposed Terminal ProblemA B C D10/11/06 CS/ECE 438 - UIUC, Fall 2006 7Exposed Terminal Problem B talks to A C wants to talk to D C senses channel and finds it to be busy C stays quiet (when it could have ideallytransmitted)A B C D10/11/06 CS/ECE 438 - UIUC, Fall 2006 7Exposed Terminal Problem B talks to A C wants to talk to D C senses channel and finds it to be busy C stays quiet (when it could have ideallytransmitted)RTSRTSA B C D10/11/06 CS/ECE 438 - UIUC, Fall 2006 7Exposed Terminal Problem B talks to A C wants to talk to D C senses channel and finds it to be busy C stays quiet (when it could have ideallytransmitted)CTSRTSRTSA B C D10/11/06 CS/ECE 438 - UIUC, Fall 2006 8MACA Solution for ExposedTerminal Problem Sender transmits Request to Send (RTS) Receiver replies with Clear to Send (CTS) Neighbors See CTS - Stay quiet See RTS, but no CTS - OK to transmitA B C D10/11/06 CS/ECE 438 - UIUC, Fall 2006 8MACA Solution for ExposedTerminal Problem Sender transmits Request to Send (RTS) Receiver replies with Clear to Send (CTS) Neighbors See CTS - Stay quiet See RTS, but no CTS - OK to transmitRTSRTSA B C D10/11/06 CS/ECE 438 - UIUC, Fall 2006 8MACA Solution for ExposedTerminal Problem Sender transmits Request to Send (RTS) Receiver replies with Clear to Send (CTS) Neighbors See CTS - Stay quiet See RTS, but no CTS - OK to transmitCTSRTSRTSA B C D10/11/06 CS/ECE 438 - UIUC, Fall 2006 8MACA Solution for ExposedTerminal Problem Sender transmits Request to Send (RTS) Receiver replies with Clear to Send (CTS) Neighbors See CTS - Stay quiet See RTS, but no CTS - OK to transmitCTSRTSRTSRTSA B C D10/11/06 CS/ECE 438 - UIUC, Fall 2006 9Collisions Still possible RTS packets can collide! Binary exponential backoff Backoff counter doubles after every collision and reset tominimum value after successful transmission Performed by stations that experience RTS collisions RTS collisions not as bad as data collisions inCSMA Since RTS packets are typically much smaller than DATApackets10/11/06 CS/ECE 438 - UIUC, Fall 2006 10Reliability Wireless links are prone to errors High packet loss rate detrimental totransport-layer performance Mechanisms needed to reduce packetloss rate experienced by upper layers10/11/06 CS/ECE 438 - UIUC, Fall 2006 11A Simple Solution to ImproveReliability - MACAW When node B receives a data packet fromnode A, node B sends an Acknowledgement(ACK) If node A fails to receive an ACK Retransmit the packetA B C10/11/06 CS/ECE 438 - UIUC, Fall 2006 11A Simple Solution to ImproveReliability - MACAW When node B receives a data packet fromnode A, node B sends an Acknowledgement(ACK) If node A fails to receive an ACK Retransmit the packetRTSA B C10/11/06 CS/ECE 438 - UIUC, Fall 2006 11A Simple Solution to ImproveReliability - MACAW When node B receives a data packet fromnode A, node B sends an


View Full Document

U of I CS 438 - Token Rings

Documents in this Course
Routing

Routing

5 pages

TCP

TCP

26 pages

TROLL

TROLL

3 pages

Load more
Download Token Rings
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Token Rings and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Token Rings 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?