13.07.2015 Views

Enhancements of the IEEE 802.11 Medium Access Control ... - PATS

Enhancements of the IEEE 802.11 Medium Access Control ... - PATS

Enhancements of the IEEE 802.11 Medium Access Control ... - PATS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 3. <strong>IEEE</strong> <strong>802.11</strong> standardconfigurations. The CS (Carrier Sense) is performed through a physical and a virtualmechanism. Both sensing mechanisms are used to determine <strong>the</strong> state <strong>of</strong> <strong>the</strong>medium. The physical carrier sensing (PHY CS) is performed by <strong>the</strong> air interface(PHY - Physical Layer). A virtual carrier sensing (VCS) mechanism is provided by<strong>the</strong> MAC. Before transmitting, a node senses <strong>the</strong> medium to determine if ano<strong>the</strong>rnode is transmitting. If <strong>the</strong> medium is not determined to be busy, <strong>the</strong> transmissionmay proceed. The CSMA/CA distributed algorithm mandates that a gap <strong>of</strong> aminimum specified duration exists between contiguous frame sequences, duringwhich a transmitting node ensures that <strong>the</strong> medium is idle before attempting totransmit. If <strong>the</strong> medium is determined to be busy, <strong>the</strong> node defers until <strong>the</strong> end <strong>of</strong><strong>the</strong> current transmission. After deferral, or prior to attempting to transmit againimmediately after a successful transmission, <strong>the</strong> node selects a random back<strong>of</strong>finterval and decrements <strong>the</strong> back<strong>of</strong>f interval counter while <strong>the</strong> medium is idle. Atransmission is successful when an ACK frame is received from <strong>the</strong> receiver.Taking into account that nodes in ad hoc networks have asymmetric information(<strong>the</strong>y are not all within radio range <strong>of</strong> one ano<strong>the</strong>r), <strong>the</strong>y cannot be based onlyon PHY CS, but also on virtual CS (VCS). A VCS mechanism is executed by overhearingRequest-To-Send/Clear-To-Send (RTS/CTS) control packets, that containa Duration/ID field which defines <strong>the</strong> duration <strong>of</strong> time required to transmit <strong>the</strong> currentdata frame and corresponding ACK packet. All nodes within <strong>the</strong> receptionrange <strong>of</strong> ei<strong>the</strong>r <strong>the</strong> originating node (which transmits <strong>the</strong> RTS) or <strong>the</strong> destinationnode (which transmits <strong>the</strong> CTS) learn <strong>of</strong> <strong>the</strong> medium reservation 1 .Fig. 3.3 depicts <strong>the</strong> RTS/CTS channel reservation. Node A transmits an RTSFigure 3.3: CSMA/CApacket to node B. Node 1 hears <strong>the</strong> RTS packet and it defers (3.3.a). Node Banswers to <strong>the</strong> node A with a CTS packets. Nodes 2 and 3 hearing this transmissionalso defer (3.3.b). Node A transmits Data packet without a collision from1 The neighbors <strong>of</strong> <strong>the</strong> receiver (sender) which are not neighbors <strong>of</strong> <strong>the</strong> sender (receiver) are calledhidden nodes to <strong>the</strong> sender (receiver), see details in Section 5.1. RTS/CTS control packet exchange isproposed in order to avoid collision from hidden nodes.36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!