0% found this document useful (0 votes)
22 views20 pages

Lecture 13 DL Layer

The lecture covers key challenges in wireless networks, including the Hidden Terminal Problem and Exposed Terminal Problem, which affect communication efficiency. It also discusses the tradeoff between packet length and error rates, highlighting that longer packets are less likely to be transmitted successfully. Solutions such as RTS/CTS mechanisms and fragmenting packets are suggested to mitigate these issues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views20 pages

Lecture 13 DL Layer

The lecture covers key challenges in wireless networks, including the Hidden Terminal Problem and Exposed Terminal Problem, which affect communication efficiency. It also discusses the tradeoff between packet length and error rates, highlighting that longer packets are less likely to be transmitted successfully. Solutions such as RTS/CTS mechanisms and fragmenting packets are suggested to mitigate these issues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Lecture objectives

To learn about:
1 – Hidden Terminal Problem
2 – Exposed Terminal
Problem
3 – Tradeoff B/w Packet
Length & Errors
Wired Vs. Wireless

• Popular CSMA/CD scheme is not applicable to wireless networks

• Doesn’t work well on a wireless network because of:

– Varying Link Quality

– Hidden and Exposed Terminal Problems

– Tradeoff between Packet Length and Errors

03
Wireless MAC Challenges: Varying Link
Quality
• Wireless links encounter time-varying quality degradation
because of:
– Noise from other devices operating in the
same spectrum
– Multipath fading
– Signal attenuation

• Popular CSMA/CD (Carrier Sense Multiple Access/Collision


Detection) scheme is not applicable to wireless networks

• Specific MAC protocols for the access to the physical layer


Last Lecture: Binary Exponential Back-
off
• Each station assumes a back-off period
after collision/contention
• Since back-off times are random, all
stations choose a different back-off time
and do not attempt to use the channel at
the same time
• After nth collision, station chooses a time
period
between 0 and 2n -1 slot times
Analogy: Wired vs. Wireless

Wireless networks:
The signal is attenuated more
intensively and the signal may
not reach all parts of the network

Wired network:
The signal propagates to all
parts of the network
Analogy: Wired vs. Wireless

The man in the middle


can’t hear both the
speaking men (their
speech is muddled).

The speakers cannot


detect each other and
they will keep on talking
not detecting the
problem at the listener.
Why not perform CD?

1) Collision detection is hard in wireless


networks

2) All collisions cannot be detected at


the sender (hidden node problem)

Collision Avoidance: avoid collisions in the


first place
Wireless LAN Configuration
Hidden Node Problem
isions (undetected) at receiver due to a hidden transm

Hidden node

Caused by Obstacle Caused by Signal Attenuation


Figure adapted from: Kurose, Ross, “Computer Networking: a Top Down Approach”
Hidden Node Problem

– ‘A’ and ‘B’ are in each others range and can


interfere
– ‘C’ can communicate and interfere with ‘B’
and ‘D’ but not ‘A’
Hidden Node Problem

• Consider the case when ‘A’ transmits to ‘B’


• ‘C’ does not detect the transmission from ‘A’ because it is out of
range
• ‘C’ falsely concludes that it can transmit
• If ‘C’ transmits, it interferes at ‘B’ with the transmission from ‘A’
garbling information
• The problem of a station not being able to detect a potential
competitor because of being distant is the ‘Hidden Node Problem’
HN Problem’s solution
Exchange of control (RTS/ CTS packets)

Figure Credits: Mustafa Ergen


Exposed Node Problem
asted bandwidth due to proximity to a transmitting no

Figure adapted from: Peterson/ Davie: “Computer Networks – A Systems Approach”


Exposed Node Problem

• Consider the reverse situation


• ‘B’ transmitting to ‘A’
• If ‘C’ senses the transmission, it could falsely conclude that the
medium is busy
• It does not send to ‘D’ when the line between ‘C’ and ‘D’ is idle
• It is termed as ‘Exposed Node Problem’
Exposed Node Solution
asted bandwidth due to proximity to a transmitting no

CTS

RTS

Figure adapted from: Peterson/ Davie: “Computer Networks – A Systems Approach”


Exposed Node Solution
asted bandwidth due to proximity to a transmitting no
• IEEE 802.11 RTS/CTS mechanism helps to solve this problem
only if the nodes are synchronized and packet sizes and
data rates are the same for both the transmitting
nodes.

• When a node hears an RTS from a neighboring node, but not


the corresponding CTS, that node can deduce that it is an
exposed node and is permitted to transmit to other
neighboring nodes.

• If the nodes are not synchronized (or if the packet sizes are
different or the data rates are different) the problem may occur
that the sender will not hear the CTS or the ACK during the
transmission of data of the second sender.
Tradeoff between Packet Length and Error
• For the same probability of error, packets of longer length
are less likely to be successfully transmitted

• For a channel with probability of bit-error=ε, the


probability of an error-free packet of length L bits is:

Pr {err-free pkt of length L bits} = (1- ε)L


Wireless MAC Challenges: Tradeoff
between Packet Length and Error
1
probability of err-free pkt 0.9
0.8
0.7 ε =0.001
0.6
0.5
0.4
0.3
0.2
0.1
0
0

0
00

00

00

00

00

00

00

00

00

00

00

00

00

00
10

40

70
10

13

16

19

22

25

28

31

34

37

40

43

46

49
pkt length

 Bandwidth efficient solution to this problem:


 Solution: Fragment long packets into multiple
fragments/frames
Side notes: Network aspects

 MTP and SCCP are part of SS7, which is a set of protocols designed to
provide control signaling within the network.
[ End of lecture ]

You might also like