Changes between Version 8 and Version 9 of 802.11/wlan_exp/app_notes/tutorial_token_mac


Ignore:
Timestamp:
Jul 7, 2015, 4:36:34 PM (9 years ago)
Author:
chunter
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • 802.11/wlan_exp/app_notes/tutorial_token_mac

    v8 v9  
    16161. '''[https://en.wikipedia.org/wiki/Carrier_sense_multiple_access_with_collision_avoidance Carrier Sense Multiple Access] - '''Devices should listen for the transmissions of competitors and defer their own transmissions to any ongoing transmissions of others.
    1717
    18 These two simple ideas form the crux of the entire 802.11 DCF. It's worth noting that these two concepts are often conflated but they are logically distinct. [https://en.wikipedia.org/wiki/ALOHAnet ALOHAnet] employed a backoff mechanism in 1971 prior to the development of CSMA. The basic idea of the DCF is to employ randomness to resolve collisions. Devices will never deadlock and continually collide. The random access structure of the DCF ensures that one device will eventually win. Additionally, the protocol tweaks the parameters of the random variables as a function of its estimation on how much contention is present in the network at any point in time.
     18These two simple ideas form the crux of the entire 802.11 DCF. It's worth noting that these two concepts are often conflated but they are logically distinct. [https://en.wikipedia.org/wiki/ALOHAnet ALOHAnet] employed a backoff mechanism in 1971 prior to the development of CSMA. The basic idea of the DCF is to employ randomness to resolve collisions. Devices will never deadlock and continually collide. The random access structure of the DCF ensures that one device will eventually win. Additionally, the protocol tweaks the parameters of the random variables as a function of its estimation on how much contention is present in the network at any point in time. When a network load is busy, each device actively reduces the likelihood of collisions by transmitting less often. When the network load is light, devices become more aggressive in the access of the shared channel in order to reduce overhead.
    1919
    20 Instead, we will implement a completely different kind of MAC based on [https://en.wikipedia.org/wiki/Token_ring the token ring]. This MAC does not use randomness to avoid collisions but rather explicitly allows only a single transmitter at a time by passing around a token that authorizes transmissions. This is a form a scheduled access MAC (as opposed to a random access MAC).
     20In this tutorial, we will implement a completely different kind of MAC based on [https://en.wikipedia.org/wiki/Token_ring the token ring]. This MAC does not use randomness to avoid collisions but rather explicitly allows only a single transmitter at a time by passing around a token that authorizes transmissions. This is a form a scheduled access MAC (as opposed to a random access MAC).
    2121
    2222||  [[Image(wiki:802.11/wlan_exp/app_notes/tutorial_token_mac/figs:token_overview.png, width=800)]]  ||
    2323||  ''TokenMAC avoids contention not through randomness, but rather through explicit token passing from a managing Access Point (AP).'''  ||
    2424
    25 In this tutorial, we will build a MAC protocol that implements the behavior depicted above. We will modify the role of an Access Point (AP) to include the responsibility of managing which device on its network has a token and is permitted to transmit.
     25In this tutorial, we will modify the role of an Access Point (AP) to include the responsibility of managing which device on its network has a token and is permitted to transmit.