SlideShare uma empresa Scribd logo
1 de 17
Resolving Data Collision in CSMA via Protocols Presented by:                                                        Anurag Pratap Singh                             CS -64                                      2912210001
Wireless LAN configuration 2
3 The 802.11 CSMA	 Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem.
RESEARCH  PAPER 1 By Fouad A. Tobagi & Leonard  A busy tone solution for hidden terminal problem in CSMA.  When a node is ready for transmission, it senses the channel to check whether the busy tone is active.  If not, it turns on the busy tone signal and starts data transmissions Otherwise, it reschedules the packet for transmission after some random rescheduling delay. Any other node which senses the carrier on the incoming data channel also transmits the busy tone signal on the control channel, thus, prevent two neighboring nodes from transmitting at the same time.                    IEEE802i:http://www.cedt.iisc.ernet.in/WEP
RESEARCH  PAPER 2 by HossamHassanein and Chi-Hsiang Yeh It assign priority for packets. it can enable different packets with different priority to access the  media and thus gain QoS. http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
RASEARCH PAPER 3 BY Tiantong You AND HossamHassanein An Adaptive Distributed ID Assignment Scheme for CSMA/IC. Achieving collision free medium access in  CSMA/IC only requires that the nodal ID is unique in its preventing range, while the nodal MAC ID (48 bits long) could guarantee uniqueness in the entire    network. IEEE 802.15.4. Part 15.4 :Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs).
RESEARCH PAPER 4 BY Zhenyu Tang and J. J. Garcia-Luna-Aceves Hop reservation multiple access protocol (HRMA)  introduced a multichannel MAC protocol which is based on half-duplex, very slow frequency-hopping spread spectrum (FHSS) radios uses a reservation and handshake mechanism to enable a pair of communicating nodes to reserve a frequency hop, thereby guaranteeing collision-free data transmission. can be viewed as a time slot reservation protocol where each time slot is assigned a separate frequency channel. IEEE: http://www.ieee802.org/1/files/public/docs2000/P8021XOverview.PDFORiNOCO security paper v2.2 <6> Copyright© 2003
RESEARCH PAPER 5 BY by J. D. Angelopoulos, N. Leligou, Th. Orphanoudakis, G. Pikrammenos MACA with Piggy-Backed Reservation (MACA/PR) Provide real-time traffic support in multi-hop wireless networks Based on the MACAW protocol with non-persistent CSMA ,[object Object],[object Object]
10 Solution by RTS-CTS protocol The CSMA protocol.  (a) A sending an RTS to B. (b) B responding with a CTS to A.
11 CSMAW Variants of this method can be found in IEEE 802.11 as DFWCSMA (Distributed Foundation Wireless CSMA), CSMAW (CSMA for Wireless) is a revision of CSMA. The sender senses the carrier to see and transmits a RTS (Request To Send) frame if no nearby station transmits a RTS. The receiver replies with a CTS (Clear To Send) frame. Neighbors see CTS, then keep quiet. see RTS but not CTS, then keep quiet until the CTS is back to the sender. The receiver sends an ACK when receiving an frame. Neighbors keep silent until see ACK. Collisions There is no collision detection. The senders know collision when they don’t receive CTS. They each wait for the exponential backoff time.
12 CSMA variant: DFWCSMA in IEEE802.11 sender receiver idle idle packet ready to send; RTS data;  ACK time-out;  RTS RxBusy wait for the  right to send RTS;  CTS time-out   data;  NAK ACK time-out   NAK; RTS CTS; data wait for data wait for ACK RTS; RxBusy ACK: positive acknowledgement NAK: negative acknowledgement RxBusy: receiver busy
13 Examples  A C A C CSMA  avoids the problem of hidden terminals A and C want to send to B A sends RTS first C waits after receiving CTS from B CSMA avoids the problem of exposed terminals B wants to send to A, C to another terminal now C does not have to wait for it cannot receive CTS from A RTS CTS CTS B RTS RTS CTS B
References [1] 1st Research Paper:The Institute of Electrical and Electronics Engineers, Inc. IEEE Std 802.11 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, 1999 edition.   [2] 2nd Research Paper: B. Leiner, D. Nielson, and F. A. Tobagi, Eds., Proceedings of IEEE GLOBECOM, Special issue on packet radio networks  [3] 3rd Research Paper: T.You, C.-H. Yeh, and H. Hassanein, “CSMA/IC: A New Class of Collision-free MAC Protocols for Ad Hoc Wireless Networks,” Proc. IEEE Int'l Symp Computer Communications (IEEE ISCC'03), June/July 2003   [4] 4th Research Paper : WINGs for the Internet project and SPARROW project. http://www.cse.ucsc.edu/research/ccrg/, Santa Cruz, CA, 1998.    .
[5] 5th  Research Paper:; J. D. Angelopoulos, N. I. Lepidas, E. K. Fragoulopoulos, I.S. Venieris,“TDMA multiplexing of  ATM cells in a residential access SuperPON”, IEEE Journal on Selected Areas in Comm., Special issue on high capacity optical transport networks, Vol. 16, No. 7, September, 1998 [6]www.google.com/lectures/IEEE 802.11 Media Access Control and Network Layer Standards [7]Chapter 6 of EE136 textbook:A. Leon-Garcia, I. Widjaja, “Communication Networks,” McGraw Hill. [8]The IEEE 802.11 specification – posted on my.poly.edu – reference materials [9]P. Brenner, “A Technical Tutorial on the IEEE 802.11 Protocol,” http://www.sss-mag.com/pdf/802_11tut.pdf
ANY
THANK YOU
Resolving Data Collision in CSMA via Protocols

Mais conteúdo relacionado

Mais procurados

Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyDeepak John
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11Adeel Mirza
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lanyanhul
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocolTom Chou
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networkingsdb2002
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Ali Habeeb
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioIJECEIAES
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayAKSHIT KOHLI
 

Mais procurados (20)

Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
 
Wlan IEEE 802.11
Wlan IEEE 802.11Wlan IEEE 802.11
Wlan IEEE 802.11
 
Shubham chakravarty ppt_wcan
Shubham chakravarty ppt_wcanShubham chakravarty ppt_wcan
Shubham chakravarty ppt_wcan
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lan
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Mac 802.11
Mac 802.11Mac 802.11
Mac 802.11
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
Ijebea14 238
Ijebea14 238Ijebea14 238
Ijebea14 238
 
Cdma 101
Cdma 101Cdma 101
Cdma 101
 
6 Ethernet
6 Ethernet6 Ethernet
6 Ethernet
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04
 
06 digital datacomm
06 digital datacomm06 digital datacomm
06 digital datacomm
 
Expt no.3
Expt no.3Expt no.3
Expt no.3
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
 
Wireless LANs
Wireless LANsWireless LANs
Wireless LANs
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
 

Destaque (10)

Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Csma
CsmaCsma
Csma
 
Csmaca
CsmacaCsmaca
Csmaca
 
Ch 13
Ch 13Ch 13
Ch 13
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Csma
CsmaCsma
Csma
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
CSMA/CD
CSMA/CDCSMA/CD
CSMA/CD
 
Aloha
AlohaAloha
Aloha
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 

Semelhante a Resolving Data Collision in CSMA via Protocols

Semelhante a Resolving Data Collision in CSMA via Protocols (20)

Mac
MacMac
Mac
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
 
Form.pptx
Form.pptxForm.pptx
Form.pptx
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Wire Lan Testing
Wire Lan TestingWire Lan Testing
Wire Lan Testing
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Mobile Effects.pptx
Mobile Effects.pptxMobile Effects.pptx
Mobile Effects.pptx
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
csma.pdf
csma.pdfcsma.pdf
csma.pdf
 
3gwireless
3gwireless3gwireless
3gwireless
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Data communication part2
Data communication part2Data communication part2
Data communication part2
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
Chapter9
Chapter9Chapter9
Chapter9
 

Último

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Último (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Resolving Data Collision in CSMA via Protocols

  • 1. Resolving Data Collision in CSMA via Protocols Presented by: Anurag Pratap Singh CS -64 2912210001
  • 3. 3 The 802.11 CSMA Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem.
  • 4. RESEARCH PAPER 1 By Fouad A. Tobagi & Leonard A busy tone solution for hidden terminal problem in CSMA. When a node is ready for transmission, it senses the channel to check whether the busy tone is active. If not, it turns on the busy tone signal and starts data transmissions Otherwise, it reschedules the packet for transmission after some random rescheduling delay. Any other node which senses the carrier on the incoming data channel also transmits the busy tone signal on the control channel, thus, prevent two neighboring nodes from transmitting at the same time. IEEE802i:http://www.cedt.iisc.ernet.in/WEP
  • 5. RESEARCH PAPER 2 by HossamHassanein and Chi-Hsiang Yeh It assign priority for packets. it can enable different packets with different priority to access the media and thus gain QoS. http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
  • 6. RASEARCH PAPER 3 BY Tiantong You AND HossamHassanein An Adaptive Distributed ID Assignment Scheme for CSMA/IC. Achieving collision free medium access in CSMA/IC only requires that the nodal ID is unique in its preventing range, while the nodal MAC ID (48 bits long) could guarantee uniqueness in the entire network. IEEE 802.15.4. Part 15.4 :Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs).
  • 7. RESEARCH PAPER 4 BY Zhenyu Tang and J. J. Garcia-Luna-Aceves Hop reservation multiple access protocol (HRMA) introduced a multichannel MAC protocol which is based on half-duplex, very slow frequency-hopping spread spectrum (FHSS) radios uses a reservation and handshake mechanism to enable a pair of communicating nodes to reserve a frequency hop, thereby guaranteeing collision-free data transmission. can be viewed as a time slot reservation protocol where each time slot is assigned a separate frequency channel. IEEE: http://www.ieee802.org/1/files/public/docs2000/P8021XOverview.PDFORiNOCO security paper v2.2 <6> Copyright© 2003
  • 8.
  • 9. 10 Solution by RTS-CTS protocol The CSMA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A.
  • 10. 11 CSMAW Variants of this method can be found in IEEE 802.11 as DFWCSMA (Distributed Foundation Wireless CSMA), CSMAW (CSMA for Wireless) is a revision of CSMA. The sender senses the carrier to see and transmits a RTS (Request To Send) frame if no nearby station transmits a RTS. The receiver replies with a CTS (Clear To Send) frame. Neighbors see CTS, then keep quiet. see RTS but not CTS, then keep quiet until the CTS is back to the sender. The receiver sends an ACK when receiving an frame. Neighbors keep silent until see ACK. Collisions There is no collision detection. The senders know collision when they don’t receive CTS. They each wait for the exponential backoff time.
  • 11. 12 CSMA variant: DFWCSMA in IEEE802.11 sender receiver idle idle packet ready to send; RTS data; ACK time-out; RTS RxBusy wait for the right to send RTS; CTS time-out  data; NAK ACK time-out  NAK; RTS CTS; data wait for data wait for ACK RTS; RxBusy ACK: positive acknowledgement NAK: negative acknowledgement RxBusy: receiver busy
  • 12. 13 Examples A C A C CSMA avoids the problem of hidden terminals A and C want to send to B A sends RTS first C waits after receiving CTS from B CSMA avoids the problem of exposed terminals B wants to send to A, C to another terminal now C does not have to wait for it cannot receive CTS from A RTS CTS CTS B RTS RTS CTS B
  • 13. References [1] 1st Research Paper:The Institute of Electrical and Electronics Engineers, Inc. IEEE Std 802.11 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, 1999 edition.   [2] 2nd Research Paper: B. Leiner, D. Nielson, and F. A. Tobagi, Eds., Proceedings of IEEE GLOBECOM, Special issue on packet radio networks  [3] 3rd Research Paper: T.You, C.-H. Yeh, and H. Hassanein, “CSMA/IC: A New Class of Collision-free MAC Protocols for Ad Hoc Wireless Networks,” Proc. IEEE Int'l Symp Computer Communications (IEEE ISCC'03), June/July 2003   [4] 4th Research Paper : WINGs for the Internet project and SPARROW project. http://www.cse.ucsc.edu/research/ccrg/, Santa Cruz, CA, 1998.   .
  • 14. [5] 5th Research Paper:; J. D. Angelopoulos, N. I. Lepidas, E. K. Fragoulopoulos, I.S. Venieris,“TDMA multiplexing of ATM cells in a residential access SuperPON”, IEEE Journal on Selected Areas in Comm., Special issue on high capacity optical transport networks, Vol. 16, No. 7, September, 1998 [6]www.google.com/lectures/IEEE 802.11 Media Access Control and Network Layer Standards [7]Chapter 6 of EE136 textbook:A. Leon-Garcia, I. Widjaja, “Communication Networks,” McGraw Hill. [8]The IEEE 802.11 specification – posted on my.poly.edu – reference materials [9]P. Brenner, “A Technical Tutorial on the IEEE 802.11 Protocol,” http://www.sss-mag.com/pdf/802_11tut.pdf
  • 15. ANY