SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Resolving Data Collision in CSMA via Protocols Presented by:                                                        Anurag Pratap Singh                             CS -64                                      2912210001
Wireless LAN configuration 2
3 The 802.11 CSMA	 Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem.
RESEARCH  PAPER 1 By Fouad A. Tobagi & Leonard  A busy tone solution for hidden terminal problem in CSMA.  When a node is ready for transmission, it senses the channel to check whether the busy tone is active.  If not, it turns on the busy tone signal and starts data transmissions Otherwise, it reschedules the packet for transmission after some random rescheduling delay. Any other node which senses the carrier on the incoming data channel also transmits the busy tone signal on the control channel, thus, prevent two neighboring nodes from transmitting at the same time.                    IEEE802i:http://www.cedt.iisc.ernet.in/WEP
RESEARCH  PAPER 2 by HossamHassanein and Chi-Hsiang Yeh It assign priority for packets. it can enable different packets with different priority to access the  media and thus gain QoS. http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
RASEARCH PAPER 3 BY Tiantong You AND HossamHassanein An Adaptive Distributed ID Assignment Scheme for CSMA/IC. Achieving collision free medium access in  CSMA/IC only requires that the nodal ID is unique in its preventing range, while the nodal MAC ID (48 bits long) could guarantee uniqueness in the entire    network. IEEE 802.15.4. Part 15.4 :Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs).
RESEARCH PAPER 4 BY Zhenyu Tang and J. J. Garcia-Luna-Aceves Hop reservation multiple access protocol (HRMA)  introduced a multichannel MAC protocol which is based on half-duplex, very slow frequency-hopping spread spectrum (FHSS) radios uses a reservation and handshake mechanism to enable a pair of communicating nodes to reserve a frequency hop, thereby guaranteeing collision-free data transmission. can be viewed as a time slot reservation protocol where each time slot is assigned a separate frequency channel. IEEE: http://www.ieee802.org/1/files/public/docs2000/P8021XOverview.PDFORiNOCO security paper v2.2 <6> Copyright© 2003
RESEARCH PAPER 5 BY by J. D. Angelopoulos, N. Leligou, Th. Orphanoudakis, G. Pikrammenos MACA with Piggy-Backed Reservation (MACA/PR) Provide real-time traffic support in multi-hop wireless networks Based on the MACAW protocol with non-persistent CSMA ,[object Object],[object Object]
10 Solution by RTS-CTS protocol The CSMA protocol.  (a) A sending an RTS to B. (b) B responding with a CTS to A.
11 CSMAW Variants of this method can be found in IEEE 802.11 as DFWCSMA (Distributed Foundation Wireless CSMA), CSMAW (CSMA for Wireless) is a revision of CSMA. The sender senses the carrier to see and transmits a RTS (Request To Send) frame if no nearby station transmits a RTS. The receiver replies with a CTS (Clear To Send) frame. Neighbors see CTS, then keep quiet. see RTS but not CTS, then keep quiet until the CTS is back to the sender. The receiver sends an ACK when receiving an frame. Neighbors keep silent until see ACK. Collisions There is no collision detection. The senders know collision when they don’t receive CTS. They each wait for the exponential backoff time.
12 CSMA variant: DFWCSMA in IEEE802.11 sender receiver idle idle packet ready to send; RTS data;  ACK time-out;  RTS RxBusy wait for the  right to send RTS;  CTS time-out   data;  NAK ACK time-out   NAK; RTS CTS; data wait for data wait for ACK RTS; RxBusy ACK: positive acknowledgement NAK: negative acknowledgement RxBusy: receiver busy
13 Examples  A C A C CSMA  avoids the problem of hidden terminals A and C want to send to B A sends RTS first C waits after receiving CTS from B CSMA avoids the problem of exposed terminals B wants to send to A, C to another terminal now C does not have to wait for it cannot receive CTS from A RTS CTS CTS B RTS RTS CTS B
References [1] 1st Research Paper:The Institute of Electrical and Electronics Engineers, Inc. IEEE Std 802.11 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, 1999 edition.   [2] 2nd Research Paper: B. Leiner, D. Nielson, and F. A. Tobagi, Eds., Proceedings of IEEE GLOBECOM, Special issue on packet radio networks  [3] 3rd Research Paper: T.You, C.-H. Yeh, and H. Hassanein, “CSMA/IC: A New Class of Collision-free MAC Protocols for Ad Hoc Wireless Networks,” Proc. IEEE Int'l Symp Computer Communications (IEEE ISCC'03), June/July 2003   [4] 4th Research Paper : WINGs for the Internet project and SPARROW project. http://www.cse.ucsc.edu/research/ccrg/, Santa Cruz, CA, 1998.    .
[5] 5th  Research Paper:; J. D. Angelopoulos, N. I. Lepidas, E. K. Fragoulopoulos, I.S. Venieris,“TDMA multiplexing of  ATM cells in a residential access SuperPON”, IEEE Journal on Selected Areas in Comm., Special issue on high capacity optical transport networks, Vol. 16, No. 7, September, 1998 [6]www.google.com/lectures/IEEE 802.11 Media Access Control and Network Layer Standards [7]Chapter 6 of EE136 textbook:A. Leon-Garcia, I. Widjaja, “Communication Networks,” McGraw Hill. [8]The IEEE 802.11 specification – posted on my.poly.edu – reference materials [9]P. Brenner, “A Technical Tutorial on the IEEE 802.11 Protocol,” http://www.sss-mag.com/pdf/802_11tut.pdf
ANY
THANK YOU
Resolving Data Collision in CSMA via Protocols

Weitere ähnliche Inhalte

Was ist angesagt?

Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyDeepak John
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11Adeel Mirza
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lanyanhul
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocolTom Chou
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networkingsdb2002
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Ali Habeeb
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioIJECEIAES
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayAKSHIT KOHLI
 

Was ist angesagt? (20)

Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11
 
Shubham chakravarty ppt_wcan
Shubham chakravarty ppt_wcanShubham chakravarty ppt_wcan
Shubham chakravarty ppt_wcan
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lan
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Mac 802.11
Mac 802.11Mac 802.11
Mac 802.11
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
Ijebea14 238
Ijebea14 238Ijebea14 238
Ijebea14 238
 
Cdma 101
Cdma 101Cdma 101
Cdma 101
 
6 Ethernet
6 Ethernet6 Ethernet
6 Ethernet
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04
 
06 digital datacomm
06 digital datacomm06 digital datacomm
06 digital datacomm
 
Expt no.3
Expt no.3Expt no.3
Expt no.3
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
 
Wireless LANs
Wireless LANsWireless LANs
Wireless LANs
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
 

Andere mochten auch (10)

Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Csma
CsmaCsma
Csma
 
Csmaca
CsmacaCsmaca
Csmaca
 
Ch 13
Ch 13Ch 13
Ch 13
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Csma
CsmaCsma
Csma
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
CSMA/CD
CSMA/CDCSMA/CD
CSMA/CD
 
Aloha
AlohaAloha
Aloha
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 

Ähnlich wie Resolving Data Collision in CSMA via Protocols

Ähnlich wie Resolving Data Collision in CSMA via Protocols (20)

Mac
MacMac
Mac
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
 
Form.pptx
Form.pptxForm.pptx
Form.pptx
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Wire Lan Testing
Wire Lan TestingWire Lan Testing
Wire Lan Testing
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Mobile Effects.pptx
Mobile Effects.pptxMobile Effects.pptx
Mobile Effects.pptx
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
csma.pdf
csma.pdfcsma.pdf
csma.pdf
 
3gwireless
3gwireless3gwireless
3gwireless
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Data communication part2
Data communication part2Data communication part2
Data communication part2
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
Chapter9
Chapter9Chapter9
Chapter9
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Resolving Data Collision in CSMA via Protocols

  • 1. Resolving Data Collision in CSMA via Protocols Presented by: Anurag Pratap Singh CS -64 2912210001
  • 3. 3 The 802.11 CSMA Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem.
  • 4. RESEARCH PAPER 1 By Fouad A. Tobagi & Leonard A busy tone solution for hidden terminal problem in CSMA. When a node is ready for transmission, it senses the channel to check whether the busy tone is active. If not, it turns on the busy tone signal and starts data transmissions Otherwise, it reschedules the packet for transmission after some random rescheduling delay. Any other node which senses the carrier on the incoming data channel also transmits the busy tone signal on the control channel, thus, prevent two neighboring nodes from transmitting at the same time. IEEE802i:http://www.cedt.iisc.ernet.in/WEP
  • 5. RESEARCH PAPER 2 by HossamHassanein and Chi-Hsiang Yeh It assign priority for packets. it can enable different packets with different priority to access the media and thus gain QoS. http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
  • 6. RASEARCH PAPER 3 BY Tiantong You AND HossamHassanein An Adaptive Distributed ID Assignment Scheme for CSMA/IC. Achieving collision free medium access in CSMA/IC only requires that the nodal ID is unique in its preventing range, while the nodal MAC ID (48 bits long) could guarantee uniqueness in the entire network. IEEE 802.15.4. Part 15.4 :Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs).
  • 7. RESEARCH PAPER 4 BY Zhenyu Tang and J. J. Garcia-Luna-Aceves Hop reservation multiple access protocol (HRMA) introduced a multichannel MAC protocol which is based on half-duplex, very slow frequency-hopping spread spectrum (FHSS) radios uses a reservation and handshake mechanism to enable a pair of communicating nodes to reserve a frequency hop, thereby guaranteeing collision-free data transmission. can be viewed as a time slot reservation protocol where each time slot is assigned a separate frequency channel. IEEE: http://www.ieee802.org/1/files/public/docs2000/P8021XOverview.PDFORiNOCO security paper v2.2 <6> Copyright© 2003
  • 8.
  • 9. 10 Solution by RTS-CTS protocol The CSMA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A.
  • 10. 11 CSMAW Variants of this method can be found in IEEE 802.11 as DFWCSMA (Distributed Foundation Wireless CSMA), CSMAW (CSMA for Wireless) is a revision of CSMA. The sender senses the carrier to see and transmits a RTS (Request To Send) frame if no nearby station transmits a RTS. The receiver replies with a CTS (Clear To Send) frame. Neighbors see CTS, then keep quiet. see RTS but not CTS, then keep quiet until the CTS is back to the sender. The receiver sends an ACK when receiving an frame. Neighbors keep silent until see ACK. Collisions There is no collision detection. The senders know collision when they don’t receive CTS. They each wait for the exponential backoff time.
  • 11. 12 CSMA variant: DFWCSMA in IEEE802.11 sender receiver idle idle packet ready to send; RTS data; ACK time-out; RTS RxBusy wait for the right to send RTS; CTS time-out  data; NAK ACK time-out  NAK; RTS CTS; data wait for data wait for ACK RTS; RxBusy ACK: positive acknowledgement NAK: negative acknowledgement RxBusy: receiver busy
  • 12. 13 Examples A C A C CSMA avoids the problem of hidden terminals A and C want to send to B A sends RTS first C waits after receiving CTS from B CSMA avoids the problem of exposed terminals B wants to send to A, C to another terminal now C does not have to wait for it cannot receive CTS from A RTS CTS CTS B RTS RTS CTS B
  • 13. References [1] 1st Research Paper:The Institute of Electrical and Electronics Engineers, Inc. IEEE Std 802.11 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, 1999 edition.   [2] 2nd Research Paper: B. Leiner, D. Nielson, and F. A. Tobagi, Eds., Proceedings of IEEE GLOBECOM, Special issue on packet radio networks  [3] 3rd Research Paper: T.You, C.-H. Yeh, and H. Hassanein, “CSMA/IC: A New Class of Collision-free MAC Protocols for Ad Hoc Wireless Networks,” Proc. IEEE Int'l Symp Computer Communications (IEEE ISCC'03), June/July 2003   [4] 4th Research Paper : WINGs for the Internet project and SPARROW project. http://www.cse.ucsc.edu/research/ccrg/, Santa Cruz, CA, 1998.   .
  • 14. [5] 5th Research Paper:; J. D. Angelopoulos, N. I. Lepidas, E. K. Fragoulopoulos, I.S. Venieris,“TDMA multiplexing of ATM cells in a residential access SuperPON”, IEEE Journal on Selected Areas in Comm., Special issue on high capacity optical transport networks, Vol. 16, No. 7, September, 1998 [6]www.google.com/lectures/IEEE 802.11 Media Access Control and Network Layer Standards [7]Chapter 6 of EE136 textbook:A. Leon-Garcia, I. Widjaja, “Communication Networks,” McGraw Hill. [8]The IEEE 802.11 specification – posted on my.poly.edu – reference materials [9]P. Brenner, “A Technical Tutorial on the IEEE 802.11 Protocol,” http://www.sss-mag.com/pdf/802_11tut.pdf
  • 15. ANY