Changes between Version 8 and Version 9 of 802.11/wlan_exp/app_notes/tutorial_token_mac
- Timestamp:
- Jul 7, 2015, 4:36:34 PM (9 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
802.11/wlan_exp/app_notes/tutorial_token_mac
v8 v9 16 16 1. '''[https://en.wikipedia.org/wiki/Carrier_sense_multiple_access_with_collision_avoidance Carrier Sense Multiple Access] - '''Devices should listen for the transmissions of competitors and defer their own transmissions to any ongoing transmissions of others. 17 17 18 These two simple ideas form the crux of the entire 802.11 DCF. It's worth noting that these two concepts are often conflated but they are logically distinct. [https://en.wikipedia.org/wiki/ALOHAnet ALOHAnet] employed a backoff mechanism in 1971 prior to the development of CSMA. The basic idea of the DCF is to employ randomness to resolve collisions. Devices will never deadlock and continually collide. The random access structure of the DCF ensures that one device will eventually win. Additionally, the protocol tweaks the parameters of the random variables as a function of its estimation on how much contention is present in the network at any point in time. 18 These two simple ideas form the crux of the entire 802.11 DCF. It's worth noting that these two concepts are often conflated but they are logically distinct. [https://en.wikipedia.org/wiki/ALOHAnet ALOHAnet] employed a backoff mechanism in 1971 prior to the development of CSMA. The basic idea of the DCF is to employ randomness to resolve collisions. Devices will never deadlock and continually collide. The random access structure of the DCF ensures that one device will eventually win. Additionally, the protocol tweaks the parameters of the random variables as a function of its estimation on how much contention is present in the network at any point in time. When a network load is busy, each device actively reduces the likelihood of collisions by transmitting less often. When the network load is light, devices become more aggressive in the access of the shared channel in order to reduce overhead. 19 19 20 In stead, we will implement a completely different kind of MAC based on [https://en.wikipedia.org/wiki/Token_ring the token ring]. This MAC does not use randomness to avoid collisions but rather explicitly allows only a single transmitter at a time by passing around a token that authorizes transmissions. This is a form a scheduled access MAC (as opposed to a random access MAC).20 In this tutorial, we will implement a completely different kind of MAC based on [https://en.wikipedia.org/wiki/Token_ring the token ring]. This MAC does not use randomness to avoid collisions but rather explicitly allows only a single transmitter at a time by passing around a token that authorizes transmissions. This is a form a scheduled access MAC (as opposed to a random access MAC). 21 21 22 22 || [[Image(wiki:802.11/wlan_exp/app_notes/tutorial_token_mac/figs:token_overview.png, width=800)]] || 23 23 || ''TokenMAC avoids contention not through randomness, but rather through explicit token passing from a managing Access Point (AP).''' || 24 24 25 In this tutorial, we will build a MAC protocol that implements the behavior depicted above. We willmodify the role of an Access Point (AP) to include the responsibility of managing which device on its network has a token and is permitted to transmit.25 In this tutorial, we will modify the role of an Access Point (AP) to include the responsibility of managing which device on its network has a token and is permitted to transmit.