Wireless LAN (IEEE 802.11 class of protocol suite) In these notes, I will explain the MAC protocols used in constructing wireless LANs using the IEEE 802.11 class of protocol suites. Specific protocols, such as the 802.11, will be discussed because these have been standardized and these are used world-wide. At this point, it is important to note the following assumption made in the design of the CSMA/CD protocol to construct a wired LAN: signal from any computer in a network can reach all computers in the network. In a wired LAN, this assumption must hold for computers to be able to reach each other and for the collision detection mechanism to work. However, in a wireless LAN, the above assumption may not hold. That is, signal from a computer may not reach all the computers in the network. Hence, at the MAC level, we do not go for collision detection. Another consequence of signal not reaching all the computers in a network is that computers in a network may not be able to communicate directly. For two computers to be able to communicate, service of another computer in the network or a fixed infrastructure, namely, an Access Point (AP), is used. C: Computer, AP: Access Point Router IEEE 802.11 protocol C To the rest of the network Access Point Radio range of the AP C AP Figure WL1: Elements of a wireless LAN (WLAN) A wireless LAN using an Access Point (AP) is shown in Figure W1. An AP is the main part of the infrastructure to support a wireless LAN. An AP is connected to a router, which in turn is connected to the rest of the network and the Internet. One of more APs 1 may be connected to the same router as shown in the figure, or different APs may be connected to different routers. The APs as well as user computers are equipped with an identical radio interface commonly known as the IEEE 802.11 standard interface. The IEEE 802.11 standard specifies both the PHY (physical) and the MAC layers for constructing a wireless LAN. The PHY layer defines the air interface between two IEEE 802.11 equipped devices and the MAC layer defines the medium access control protocols to access the shared medium. (There are a variety of the IEEE 802.11 protocol, such as 802.11a, 802.11b, 802.11g, and 802.11e. Protocols such as the 802.11, 802.11a, 802.11b, and 802.11g differ only in their PHY part, thereby supporting different levels of bandwidth, whereas all their MAC protocols follow the same principle. On the other hand, the 802.11e MAC, which has been designed to support multimedia applications, is different from the above protocols. In these notes, we will not discuss the 802.11e protocol for lack of time. However, once one understands the 802.11 MAC protocol, it is easier to understand the more complex 802.11e protocol.) Different modes of operation of IEEE 802.11 MAC protocol Before discussing the details of the IEEE 802.11 MAC protocol, it is useful to understand the different modes of operation of the protocol as classified below. Modes of IEEE 802.11 MAC Distributed Coordination Function (DCF) mode With Hand-shake Point Coordination Function (PCF) mode Without Hand-shake Figure W1: Different modes of operation of MAC protocol in a WLAN PCF mode of operation In this mode of operation, an AP acts as the central controller for all the computers lying within the radio range of the AP. The AP decides who transmits when. Thus, there is no 2 contention among computers for medium access. The AP can, but not necessarily, follow a round-robin policy to assign time slots to individual computers, thereby guaranteeing a certain amount of bandwidth to each computer. Because of this guarantee of allocation of bandwidth, this mode of operation can support real-time traffic. However, if the amount of traffics generated by different computers widely vary, this mode is not suitable. This is due to the fact that the AP may allocate bandwidth to a computer which may not have much data to transmit. Finally, the IEEE 802.11 standard says that implementation of the PCF mode of operation is optional. DCF mode of operation In this mode of operation, the presence of an AP is not essential. For example, computers can communicate among themselves using the DCF mode of operation without the assistance of an AP. In such a case, we say that the computers have formed an ad hoc network, where there is an absence of infrastructure, such as APs. However, to construct a wireless LAN with the capability to connect to the Internet, it is essential to have an AP which is connected to a router as shown in Figure W1. Whether or not there is an AP, in the DCF mode of operation all the computers compete for medium access, because there is no central controller—if there is an AP, it does not act as a central controller. Because of contention among computers for medium access, there is no guarantee of bandwidth and there is no bound on message delay. Thus, the DCF mode of operation is not suitable for real-time traffic. Rather, data delivery is made on a best effort basis—the network makes an effort to deliver data across the wireless medium, but there is no guarantee of bandwidth or bound on delay. Finally, the IEEE 802.11 standard says that implementation of the DCF mode of operation is mandatory, that is, the DCF mode of operation must be supported by a network card claiming to implement IEEE 802.11. Note: We have said that the PCF mode is optional, whereas the DCF mode is mandatory. If an AP implements both the modes, the following is a scenario in which both the modes can be used alternatively. For example, the network can run in the PCF mode for T1 seconds, followed by the DCF mode for T2 seconds, followed by the PCF mode for T1 seconds, and so on. In this manner, all, or, some, computers get a guaranteed bandwidth during the PCF mode, whereas all the computers compete for bandwidth in the DCF mode. Those computers without data to be transmitted will not compete for medium access during the DCF mode, thereby allowing those computers with data to enter the contention phase. PCF DCF PCF DCF PCF …….. Time Figure W2: Alternative use of PCF and DCF modes 3 DCF with hand-shake In this mode, a sender obtains permission from an intended receiver before transmitting a packet to the receiver. This is achieved by the sender transmitting a Request To Send (RTS) packet to the intended receiver, and the receiver granting permission by transmitting a Clear To Send (CTS) packet back to the sender. The intended receiver may refuse to grant permission by remaining silent, i.e. not transmitting a CTS packet back to the sender. The sequence of RTS and CTS control packets is known as the process of hand-shake. An intended receiver can refuse to receive a packet from the sender for a variety of reasons, such as lack of buffer and lack of interest in communicating with the sender, to name a few. This mode of operation is preferred where the network traffic is high or if the packet to be transmitted is a long one. In either case, if hand-shake is not used, the packet will collide with another packet at the receiver with high probability. Thus, it is recommended to use the hand-shake mode of DCF when traffic is very high in the network or a packet is very long. The flip side of using hand-shake is the extra overhead of exchanging RTS/CTS control frames. Essentially, before transmitting a long packet, a sender not only informs the intended receiver about the upcoming transmission, but also both the sender and the intended receiver inform their neighbors—via the RTS and CTS control frames—about the upcoming transmission so that the neighbors do not initiate their own transmissions while the packet is being transmitted and acknowledged. (The idea of data packet acknowledgement at the MAC level will be explained in a later part of this section.) DCF without hand-shake In this mode of operation, a sender does not take permission from an intended receiver before transmitting a data packet. That is, RTS/CTS control frames are not exchanged between a sender and a receiver before the sender transmits a data packet. Rather, the sender just transmits the packet when certain medium sensing conditions are satisfied. These conditions will be explained in a later part of these notes. Thus, there is no coordination between a sender and a receiver prior to a data packet being transmitted. This lack of coordination increases the probability of packet collision. If data traffic is low or packets are short, then this mode of data transmission avoids the overhead due to hand-shaking. Note: The two modes of DCF operation, namely with hand-shake and without handshake, are not mutually exclusive. Rather, both coexist, and the two modes can be selected on a packet basis. For example, the dotRTSThreshold variable in the MAC management database can be used to choose a certain mode of operation. The dotRTSThreshold variable is initialized with an integer value representing a threshold packet length in bytes. If the length of a data packet is equal to or greater than the dotRTSThreshold value, then the MAC layer chooses the “with hand-shake” mode. On the other hand, if the packet length is smaller than the dotRTSThreshold 4 value, then the “without hand-shake” mode is chosen to transmit the data packet. This situation has been further explained in Figure W3. Figure W3 shows that a wireless LAN can alternatively operate in the PCF and DCF modes, and within the same DCF mode duration, a computer can successively transmit two data packets in the “without handshake” and the “with hand-shake” modes. PCF DCF PCF DCF PCF } With hand-shake Without handshake …….. Time mode of operation of the same computer Figure W3: Alternative use of PCF and DCF modes and consecutive appearances of “with hand-shake” and “without hand-shake” modes in the same DCF period. Problems in a wireless LAN There are three problems in a wireless LAN, which are not found in wired LANs. These problems are as follows: - Hidden terminal problem - Exposed terminal problem - Inability to detect collision. Hidden terminal problem Assume that all the computers have identical radio ranges. This assumption is not necessary for the problem to occur. Rather, the problem becomes more frequent in the absence of this assumption. Thus, for simplicity of our explanation, we make this assumption. Let there be three computers A, B, and C as shown in Figure W4. Their relative locations and radio ranges have also been shown in Figure W4. The figure shows that A and B are within each other’s radio ranges, and B and C too are within each other’s radio ranges. Thus, the direct communications that can happen are between A and B and between B and C. However, A and C are outside each other’s radio ranges. Now, assume that C is transmitting to B as shown in the figure. Since C is far away from A, A is unaware of the fact that there is an on-going transmission between B and C. Because of this unawareness, A can potentially start its transmission to B or another computer (not shown in the figure), thereby disturbing C’s transmission to B. This disturbance happens because C is hidden from A. Thus, a hidden terminal problem occurs when a computer (A) starts its transmission while being unaware of a far-away located computer’s (C’s) 5 transmission to A’s neighbor (B). In other words, the problem can occur if two computers (A and C) have a common neighbor (B), but the two computers can not hear each other’s signals. Because users, and, hence their computers, are mobile in a wireless LAN, the hidden terminal problem occurs in a wireless LAN. Suitable measures are taken in the IEEE 802.11 MAC protocol to address this problem. Tx A B C Figure W4: Illustration of the hidden terminal problem Exposed terminal problem Referring to Figure W5, assume that the pairs of computers (D, A), (A, B), and (B, C) are Neighbors in the sense that D and A are within each other’s radio ranges. Let A be transmitting a data packet to D. Because of the broadcast nature of this transmission, the same signal also reaches computer B. However, B is not an intended receiver of A’s signal. We also know that C is not receiving A’s signal. Thus, it is possible for B to start transmitting a data packet to C without disturbing the ongoing transmission from A to D. However, B does not initiate its transmission, because it is unaware of D’s location. B does not know if its transmission to C will cause a collision at D. Hence, B does not initiate its transmission while being exposed to A’s signal. This is called the exposed terminal problem. In other words, a computer does not start transmitting if it senses that there is an ongoing transmission. Researchers are investigating this issue so that network performance is improved by allowing an exposed terminal to transmit subject to the condition that it does not disturb an ongoing transmission. Tx D A B C 6 Figure W5: Illustration of the exposed terminal problem Inability to detect collision Ideally, a sender should detect collision at a receiver, because it is the collision at the receiver that matters. In a wired LAN, collision is detected at the sender’s end by assuming that signals from all computers can reach all other computers. However, this assumption does not hold in a wireless LAN as it has been explained in the context of the hidden terminal problem. Another reason for the difficulty in not being able to detect collision is that many wireless devices use half duplex transceivers to simplify transceiver design. That is, a half-duplex wireless device turns on its transmitter and receiver in an alternating manner. As an example, GSM phones use half-duplex transceivers, and this is facilitated by skewing the up-link (transmitting) channel and the down-link (receiving) channel by three time slots so that the transceiver can switch its mode from a transmitter to a receiver and vice versa. Thus, in a wireless LAN, because of the difficulty in detecting collision, MAC protocols do not rely upon collision detection. Rather, the principle of collision avoidance is utilized. Transmit condition and virtual carrier sensing Before a computer can transmit anything—data or control packets—it is essential to detect idleness of the medium. In a wired LAN, it was sufficient to detect idleness by sensing the physical medium. However, in a wireless LAN, because of the hidden terminal problem, it is not enough to sense the medium to know whether or not the medium is idle. In addition to carrier sensing at the PHY level, the WLAN MAC protocol uses the concept of virtual carrier sensing to tackle the hidden terminal problem. In virtual carrier sensing, a computer monitors the transmission of all control packets that it can receive, utilizes the duration information contained in those packets, and infers whether or not the medium is idle at its intended receiver. Thus, the medium is said to be idle if the PHY level carrier sensing mechanism detects no carrier and it is inferred from the virtual carrier sensing mechanism that the intended receiver within its radio range is not receiving data. 7 Transmit condition Medium is idle Absence of carrier detected by the carrier sensing mechanism at the PHY level. and The virtual carrier sensing mechanism tells that the medium is free. Figure W6: Condition for medium idleness Virtual carrier sensing is implemented by using two concepts as listed below: - - Control frames (or, packets) o Request-To-Send (RTS) frame o Clear-To-Send (CTS) frame Network Allocation Vector (NAV): This is a scalar, integer variable held by each computer. Suppose that a computer A wants to transmit data to another computer B. Before transmitting the data frame, A transmits an RTS frame to B. The major fields of an RTS frame are: A’s and B’s addresses and a duration field. The duration field tells B the length of time for which the medium is likely to remain busy due to A’s data transmission and B’s acknowledgement. An RTS frame is a point-to-point frame in the sense that only B should respond (a CTS frame) to the RTS frame. Also, an RTS frame is a broadcast frame in the sense that all those receiving this frame are supposed to extract the duration field out of the packet to update its NAV, but the unintended receivers do not send back a response (a CTS frame). By transmitting an RTS frame, computer A achieves two objectives as outlined below: - Computer A requests permission from B. Computer A informs all its neighbors of a likely data transmission within a certain time interval so that the neighbors do not transmit anything within the said interval. If, or when, B receives the RTS frame, it decides whether or not to receive a data frame from A. In case B wants to receive a data frame from A, it responds back to A by transmitting a CTS frame. Contained in the CTS frame will be A’s address and the 8 duration for which the medium is likely to remain busy around B. All computers, except A, receiving the CTS frame extract the duration value and update their NAV variables. Neighbors of A will receive A’s RTS and neighbors of B will receive B’s CTS. All computers, except the pair A and B, receiving an RTS or a CTS shall not initiate a transmission in the period denotes the duration fields of the RTS/CTS frames. Computers update and interpret their NAV variables as follows. - Each computer has its own NAV with an initial value of 0. - NAV represents for how long the medium is likely to remain busy. - The unit of time information in NAV is microseconds. - NAV is decremented by 1 with the elapse of each microsecond of real time. - When NAV = 0, it is no more decremented. - NAV is updated using the duration field in a received control frame as follows: o NAV = Max(NAV, duration value received in a control frame) - NAV = 0 means no pre-announced transmission is going on in the vicinity. - Idle medium is defined as absence of carrier AND NAV = 0. Timing relationship between RTS and CTS The hand-shake mechanism using RTS and CTS control frames has been illustrated in Figure W7. In Figure W7 we assume that computer A wants to send a data frame to computer B, C is a computer within the radio range of A, and D is a computer within the radio range of B. We also assume that D is out of range of A, and C is out of range of B. The four frames, namely RTS, CTS, DATA, and ACK, are separated by a time interval known as Short InterFrame Space (SIFS). The idea behind this spacing is to maintain a logical association between these frames. Because of propagation delay and the delay involved in computing a response to a frame, there is a need to have an allowed time gap between logically related frames. For example, when a station, say, B, has successfully received an RTS, it should be given an opportunity to respond back with a CTS without any disturbance from other computers. This is achieved by allowing B to make a decision within SIFS interval and send back a CTS. It may be noted that no other computer within A’s and B’s transmission range should transmit a packet during the SIFS gaps in Figure W7. This is achieved by having the computers sense the medium to be idle for more than the SIFS interval. (These intervals are known as PIFS—Point InterFrame Space—and DIFS—Distributed IFS.) An important thing in Figure W7 is the concept of acknowledgement (ACK) sent from B to A. If B receives the DATA frame successfully, it sends back an ACK to A. It is useful to recall that there is no such ACK mechanism in the CSMA/CD protocol for Ethernet. The reason for including an ACK at the MAC level in wireless LANs and not having it in the MAC protocol for wired LAN is that the bit error rate (BER) in case of high quality wired LAN is very low, whereas the BER in a wireless environment is comparatively very high. For example, the BER on a fiber link is as low as 10 -12 whereas it is 10-5 on a 9 wireless link. If the concept of ACK is not used at the MAC level in a wireless LAN, upper level protocols will have to handle the resulting packet loss. Because of the longer timeouts involved in upper-level protocols and the possibility of loss of retransmitted packets from the upper-level protocols, handling packet loss at the upper-level is much more expensive than the cost involved at the MAC level where the probability of packet error is high. However, if the probability of packet error is extremely low at the PHY level, handling packet error is left to the upper-level protocols due to the extra cost of running the ACK mechanism at the MAC level. Value of “duration” in RTS A SIFS RTS DATA Value of “duration” in CTS B SIFS SIFS CTS ACK Value of NAV of C C Value of NAV of D D Time Figure W7: The hand-shake mechanism using RTS/CTS Note: Two computers, by exchanging RTS and CTS frames, inform their neighbors to not initiate a transmission during the period reserved by the RTS/CTS frames. Thus, the neighbors refrain from initiating their own transmissions during the said period and help in avoiding potential collisions. Hence, the RTS/CTS mechanism works to achieve the goal of collision avoidance. 10 DCF mode of operation with hand-shake In the following, we give a flow-chart representation of the DCF protocol with handshake. We have already explained the basic concepts used in the protocol, such as the idea of RTS/CTS. We will present the protocol in two parts in the form of a sender’s behavior (Figure W8) and a receiver’s behavior (Figure W10). 11 F: a new data frame to be transmitted i = 0, CW = CWmin NAV = 0? End of backoff Idle medium for DIFS interval? No Random Backoff Yes Send an RTS Start a timer CTS is received Timeout Cancel timer Send DATA (F) Start a timer ACK is received Wait for fairness to others Cancel timer Wait for a random interval Timeout i = i+1 CW = CWmin*2i (At some point, CW saturates at CWmax.) i: Retry count, CW: Contention Window CWmin: Minimum value of CW (typical value is 32) CWmax: Maximum value of CW (typical value is 256) DIFS: Distributed Interframe Space SIFS < DIFS Important note Figure W8: Hand-shake mode of DCF operation (Sender’s behavior) The random backoff protocol (the dotted box in Figure W8) The backoff mechanism in the WLAN protocol works differently from the backoff mechanism in CSMA/CD protocol for Ethernet as follows. - Choose a random number in the range [0, CW]. A variable, called Backoff Time Counter (BTC) is initialized with the chosen random number. The unit of time represented by the BTC variable is denoted by aSlotTime, where 12 - - aSlotTime accounts for propagation time and transceiver switching time (switching time between transmitter and receiver and vice versa.) BTC is decremented by 1 if the channel is idle for aSlotTime. Stop decrementing the BTC if the medium is busy. Resume decrementing the BTC after finding the channel to be idle for DIFS interval. Thus, whenever the channel is found to be busy, decrementing of BTC is done after finding the channel to be idle for DIFS interval immediately after the busy period ends. Once the channel is idle for at least DIFS interval, subsequent decrement is done for each idle period of aSlotTime interval. (See Figure W9 for an illustration.) BTC = 0 means that the backoff process has finished. A computer remains in the backoff state for at least BTC time units of real-time and during this period the medium is idle. In Figure W9, we give an example of how BTC is decremented by computer B. We assume that the channel remains busy due to activities of computers A and C. Here, the focus is on how BTC decrements and not on who should transmit when. The random initial value of BTC is assumed to be 5. Note: The reader may note an important relationship between SIFS and DIFS in the form of SIFS < DIFS. In the DCF mode, a computer senses the medium to be idle for at least a DIFS period. Thus, even if the computer finds the medium to be idle for SIFS period between frames in the sequence {RTS, CTS, DATA, ACK}, it does not initiate a transmission in order to not disturb an ongoing communication. Thus, the relationship SIFS < DIFS is very important. A recommended equality relationship between SIFS and DIFS is: DIFS = SIFS + 2*aSlotTime (This relationship will be made clearer in a later part of these notes.) 13 Ch. Busy (A) Ch. Busy (C) Time DIFS DIFS X B BTC = 5 4 X 3 X 2 X 2 2 1 0 If the channel is busy, it has to remain idle for DIFS interval for BTC to be decremented by 1. X = aSlotTime If the channel is idle for at least DIFS interval, it has to remain idle for aSlotTime interval for BTC to be decremented by 1. Figure W9: Illustration of how BTC decrements from a random initial value of 5. 14 Remain silent. Receive an RTS NAV = 0? No Receive a DATA frame Yes Channel is idle for SIFS and the computer is ready to receive? No Ch. idle for SIFS? No Yes Yes Send an ACK Send a CTS Note: The above two fragments of flow-charts can be easily merged. Figure W10: Hand-shake mode of DCF operation (Receiver’s behavior) 15 DCF mode of operation without hand-shake The DCF mode of operation without hand-shake is a special case of the DCF mode of operation with hand-shake. In this mode, RTS and CTS frames are not exchanged between two computers before the sender transmits its DATA frame. A receiver must respond to a correctly received DATA frame with an ACK frame. The idea of NAV is still used in this mode of operation. This is because of the fact that even if a computer does not use the hand-shake mode, it must update its NAV if it receives an RTS or a CTS frame from another computer. A network card may implement both the modes of DCF operation and dynamically decide what mode to use on a frame basis. Note: A computer may wish to broadcast a DATA frame to all its neighbors. By broadcast, we mean all the neighbors are the DATA frame’s intended receivers. For a DATA frame to be broadcast, we need to remember two points as follows: - A DATA frame is broadcast in the DCF without hand-shake mode. Receivers of a broadcast frame do not send back ACK frames. Thus, though broadcast operation is a desirable one, there is no guarantee of its reliability at the MAC level, i.e., there is no guarantee that all the neighbors of the sender will receive a copy of a broadcast frame. A broadcast frame is distinguished from a point-topoint DATA frame by using an appropriate addressing mechanism in the header of DATA frame. PCF mode of operation In the PCF mode of operation, an Access Point (AP) is a key element in a WLAN. The AP controls the channel by alternating between the PCF mode and the DCF mode. For an AP to be in full control of the channel, it grabs the channel as follows: - The AP senses the medium to be idle at the beginning of a contention-free (CF) period for a PIFS (PCF InterFrame Space) interval. The PIFS interval has an important relationship with the other two intervals, namely, SIFS and DIFS, in the form of: SIFS < PIFS < DIFS. This is how we interpret the above relationship. Frames in the sequence {RTS, CTS, DATA, ACK} maintain a gap of SIFS. By having SIFS < PIFS, the AP lets an ongoing transmission to be completed before grabbing the channel. By having PIFS < DIFS, we make sure that another computer is prevented from acquiring the channel, thereby giving priority to the AP to grab the channel. This happens because in the DCF mode of operation, a computer must observe the channel to 16 be idle for at least DIFS interval. In terms of equality relationships, recommended values of SIFS, PIFS, and DIFS are as follows: PIFS = SIFS + aSlotTime DIFS = SIFS + 2*aSlotTime - - If an AP finds that the medium is idle for a PIFS interval, it transmits a Beacon frame. A Beacon frame contains a CFPMaxDuration field (CFP: Contention-Free Period.) This value communicates the length of the CF period to all stations. Essentially, this value tells the user computers the maximum duration for which the AP will be controlling the medium. Computers receiving a Beacon frame update their NAV value with the CFPMaxDuration value. Consequently, user computers are prevented from taking control of the medium until the end of the CF period. This is because for a user computer to access the medium, first its NAV must reach 0. After transmitting a Beacon frame, the AP waits for at least one SIFS interval and next transmits one of the following frames: o DATA frame o CF Poll frame o Data+CF Poll frame o ACK frame o CF End frame The above frame types have been explained in the following. - - DATA frame: o This frame contains user data from the AP to a particular station. o Upon correctly receiving the DATA frame, a user computer sends back an ACK frame to the AP after an SIFS interval. o If the AP does not receive an ACK, it can retransmit the frame after a PIFS interval. o An AP can also transmit broadcast and multicast DATA frames to all the users or a subset of the users, respectively. o Broadcast and multicast frames are not ACKed. CF Poll frame (explained in Figure W11): o An AP sends this frame to a computer granting the computer permission to transmit a single DATA frame to any destination—the AP or another user computer. o Receiver of the above DATA frame sends back an ACK to the polled computer (This is the computer that sent out the DATA frame.) o If the polled computer has no DATA frame, it must send a null DATA frame. o If a polled station does not receive an ACK, it can not retransmit its data frame unless it is polled again. 17 User 1 AP User 2 User 1 AP CF Poll CF Poll SIFS DATA ACK DATA SIFS SIFS The polled user sends data to another user. SIFS ACK The polled user sends data to the AP. Figure W11: CF Poll frame - DATA + CF Poll (See Figure W12.) User 1 AP User 2 DATA+ CF Poll SIFS ACK DATA SIFS ACK The polled user receives data from the AP and sends data to another user. Figure W12: DATA+CF Poll frame 18 - CF End: This frame identifies the end of the CF period. This is sent by an AP when one of the following happens: o The AP has no data to transmit and no computer to poll. This can happen before the pre-announced CFPMaxDuration value expires. Thus, the AP can prematurely terminate its CF period by transmitting a CF End frame. When the user computers receive this frame, those reset their NAV to 0. o The CFPDurRemaining time expires. This variable is initialized with the value of CFPMaxDuration that was broadcast in a Beacon frame. As time passes, CFDurRemaining is decremented and its value represents the remaining time for which the AP will be in control of the channel. A computer joining a WLAN with an AP In this part of the notes, we explain how a computer joins a wireless network with an AP. (There is no need for such a protocol in a wired LAN, because by plugging in a new computer to a wired LAN, your computer automatically becomes a part of the LAN.) A station can join a WLAN in one of two ways: - by passive scanning by active scanning Passive Scanning: A station listens to each channel for a specific period of time. (A channel can be considered as a certain carrier frequency. All the computers and the AP transmit on the same carrier frequency. If the radio ranges of two APs overlap, they use different channels.) Initially, a computer does not know if there is a nearby AP and the channel used by the AP. Thus, it has to listen to each channel for a certain interval. Listening to a channel means waiting to receive a Beacon frame transmitted on the channel. After the computer receives a Beacon frame, the computer can negotiate a connection with the AP by proceeding with the authentication and association processes. Active Scanning: In this mode of joining a WLAN, a computer sends a Probe frame to an AP by using the broadcast mechanism, and waits for a Probe Response from the nearby AP. A Probe Response frame identifies the presence of a network. Once a computer receives a Probe Response frame, it can negotiate a connection with the AP by proceeding with the authentication and association processes. 19 Comparison of CSMA/CD MAC for LAN and CSMA/CA MAC for WLAN Finally, we compare the CSMA/CD and CSMA/CA protocols for Ethernet LAN and wireless LAN, respectively. The comparison will focus on the important concepts involved in the design of those protocols. CSMA/CD (Ethernet LAN) CSMA/CA (Wireless LAN) Collision Detection Yes No In wireless networks, in general, it is not possible to detect collision. ACK of data frames No Yes In a wireless network, it is important to ACK data frames because of the high BER (bit error rate). No Yes An AP in a WLAN is a central controller. Multi-mode Data transmission No Yes PCF and DCF (with/without hand-shake) Sensitivity to data frame length No Yes Short packet: DCF without hand-shake Long packet: DCF with hand-shake Fairness Yes Yes Rate of transmission High Low Achieved using a random wait after successfully transmitting a data frame. The low rate in WLAN is due to the unreliable characteristic of wireless medium Real-time traffic support No (best effort) Yes Features Possible use of a central controller Comments An AP in the PCF mode can support time-sensitive traffic. 20