Changes between Version 7 and Version 8 of 802.11/wlan_exp/app_notes/tutorial_token_mac


Ignore:
Timestamp:
Jul 7, 2015, 4:33:30 PM (9 years ago)
Author:
chunter
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • 802.11/wlan_exp/app_notes/tutorial_token_mac

    v7 v8  
    1111== Overview of TokenMAC ==
    1212
     13The entire purpose of a MAC is to figure out a way that a shared wireless medium can be split up amount multiple competing devices. The standard 802.11 DCF employs two classic techniques to achieve this goal:
     14
     151. '''[https://en.wikipedia.org/wiki/Exponential_backoff Binary Exponential Backoff] - '''Devices should randomly dither their transmission times to reduce the likelihood they transmit at the same time as another device. In the event of a failed transmission, a device should increase the average wait time before the next transmission. The result is that a large network of many competitors inherently reduces the rate at which each competitor contends for the medium.
     161. '''[https://en.wikipedia.org/wiki/Carrier_sense_multiple_access_with_collision_avoidance Carrier Sense Multiple Access] - '''Devices should listen for the transmissions of competitors and defer their own transmissions to any ongoing transmissions of others.
     17
     18These two simple ideas form the crux of the entire 802.11 DCF. It's worth noting that these two concepts are often conflated but they are logically distinct. [https://en.wikipedia.org/wiki/ALOHAnet ALOHAnet] employed a backoff mechanism in 1971 prior to the development of CSMA. The basic idea of the DCF is to employ randomness to resolve collisions. Devices will never deadlock and continually collide. The random access structure of the DCF ensures that one device will eventually win. Additionally, the protocol tweaks the parameters of the random variables as a function of its estimation on how much contention is present in the network at any point in time.
     19
     20Instead, we will implement a completely different kind of MAC based on [https://en.wikipedia.org/wiki/Token_ring the token ring]. This MAC does not use randomness to avoid collisions but rather explicitly allows only a single transmitter at a time by passing around a token that authorizes transmissions. This is a form a scheduled access MAC (as opposed to a random access MAC).
     21
    1322||  [[Image(wiki:802.11/wlan_exp/app_notes/tutorial_token_mac/figs:token_overview.png, width=800)]]  ||
    14 ||  ''TokenMAC avoids contention not through randomness, but rather through explicit token passing from a managing AP.'''  ||
     23||  ''TokenMAC avoids contention not through randomness, but rather through explicit token passing from a managing Access Point (AP).'''  ||
     24
     25In this tutorial, we will build a MAC protocol that implements the behavior depicted above. We will modify the role of an Access Point (AP) to include the responsibility of managing which device on its network has a token and is permitted to transmit.