Lecture 7 Multiple Access Protocols and Wireless



Similar documents
10. Wireless Networks

Random Access Protocols

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

COMP 3331/9331: Computer Networks and Applications

Data Center Networks, Link Layer Wireless (802.11)

EPL 657 Wireless Networks

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

ECE/CS 372 introduction to computer networks. Lecture 13

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

CSE 123A Computer Networks

CS263: Wireless Communications and Sensor Networks

Chapter 6: Wireless and Mobile Networks

Ethernet, VLAN, Ethernet Carrier Grade

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Lecture 17: Wireless Networking"

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Based on Computer Networking, 4 th Edition by Kurose and Ross

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

How To Make A Multi-User Communication Efficient

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Wiereless LAN

MAC Algorithms in Wireless Networks

Chapter 7 Low-Speed Wireless Local Area Networks

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

CSMA/CA. Information Networks p. 1

... neither PCF nor CA used in practice

communication over wireless link handling mobile user who changes point of attachment to network

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

ECE 428 Computer Networks and Security

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

The Wireless Network Road Trip

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling

Chapter 6 Wireless and Mobile Networks

Hello viewers, welcome to today s lecture on cellular telephone systems.

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Chapter 6: Medium Access Control Layer

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Adaptive DCF of MAC for VoIP services using IEEE networks

Controlled Random Access Methods

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

EETS 8316 Wireless Networks Fall 2013

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

IEEE Wireless LAN

Wireless Personal Area Networks (WPANs)

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Real-Time (Paradigms) (51)

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

EECC694 - Shaaban. Transmission Channel

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Performance Evaluation of Wired and Wireless Local Area Networks

IEEE Technical Tutorial. Introduction. IEEE Architecture

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

Medium Access Control (MAC) and Wireless LANs

1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

RTT 60.5 msec receiver window size: 32 KB

WPAN. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

IEEE Wireless LAN Standard. Updated: 5/10/2011

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Wireless LAN Concepts

: Instructor

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

Revision of Lecture Eighteen

Performance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE Kang Sun

IEEE Ad Hoc Networks: Performance Measurements

Mobile Ad Hoc Networks

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Mobile Computing/ Mobile Networks

WI-FI TECHNOLOGY: SECURITY ISSUES

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

IT4405 Computer Networks (Compulsory)

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO

Video Transmission over Wireless LAN. Hang Liu

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

IEEE WLAN (802.11) ...Copyright. Renato Lo Cigno

How To Determine The Capacity Of An B Network

Wireless LAN Services for Hot-Spot

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

GTER 26 tudo o que você. quer saber sobre n

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

TCP in Wireless Networks

A Technical Tutorial on the IEEE Protocol

CMPE 150: Introduction to Computer Networks FINAL REVIEW. Venkatesh Rajendran. Spring 2003 UCSC CMPE150 1

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Transcription:

Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57

Lecture 6 Review What is the responsibility of the link layer? What services does the link layer provide? What diffeerent methods are there for error derection? Descripe ARP Describe characteristics for Ethernet Describe characteristics of an Ethernet switch What is the main difference between a switch and a router? Review November 11, 2013 2 / 57

Multiple Access Protocols Multiple Access Protocols November 11, 2013 3 / 57

Multiple access links, protocols two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch, host broadcast (shared wire or medium) old-fashioned Ethernet upstream HFC 802.11 wireless LAN Multiple Access Protocols November 11, 2013 4 / 57

Multiple access protocols single shared broadcast channel two or more simultaneous transmissions by nodes: interference collision if node receives two or more signals at the same time multiple access protocol distributed algorithm that determines how nodes share channel, i.e., determine when node can transmit communication about channel sharing must use channel itself! no out-of-band channel for coordination Multiple Access Protocols November 11, 2013 5 / 57

An ideal multiple access protocol given: broadcast channel of rate R bps desiderata: 1 when one node wants to transmit, it can send at rate R. 2 when M nodes want to transmit, each can send at average rate R/M 3 fully decentralized: no special node to coordinate transmissions no synchronization of clocks, slots 4 simple Multiple Access Protocols November 11, 2013 6 / 57

MAC protocols: taxonomy Three broad classes: channel partitioning divide channel into smaller pieces (time slots, frequency, code) allocate piece to node for exclusive use random access channel not divided, allow collisions recover from collisions taking turns nodes take turns, but nodes with more to send can take longer turns Multiple Access Protocols November 11, 2013 7 / 57

Channel partitioning MAC protocols: TDMA TDMA: time division multiple access access to channel in rounds each station gets fixed length slot (length = pkt trans time) in each round unused slots go idle example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle Multiple Access Protocols Channel Partitioning November 11, 2013 8 / 57

Channel partitioning MAC protocols: FDMA FDMA: frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go idle example: 6-station LAN, 1,3,4 have pkt, frequency bands 2,5,6 idle Multiple Access Protocols Channel Partitioning November 11, 2013 9 / 57

Random access protocols when node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes collision, random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) examples of random access MAC protocols: slotted ALOHA ALOHA CSMA, CSMA/CD, CSMA/CA Multiple Access Protocols Random access protocols November 11, 2013 10 / 57

Slotted ALOHA assumptions: all frames same size time divided into equal size slots (time to transmit 1 frame) nodes start to transmit only slot beginning nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision operation: when node obtains fresh frame, transmits in next slot if no collision: node can send new frame in next slot if collision: node retransmits frame in each subsequent slot with prob. p until success Multiple Access Protocols Random access protocols November 11, 2013 11 / 57

Slotted ALOHA Pros: single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons: collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet clock synchronization Multiple Access Protocols Random access protocols November 11, 2013 12 / 57

Slotted ALOHA: efficiency Efficiency: long-run fraction of successful slots (many nodes, all with many frames to send) suppose: N nodes with many frames to send, each transmits in slot with probability p prob that given node has success in a slot = p(1 p) N 1 prob that any node has a success = Np(1 p) N 1 max efficiency: find p that maximizes Np(1 p) N 1 for many nodes, take limit of Np (1 p ) N 1 as N goes to infinity, gives: max efficiency = 1 e = 0.37 At best: channel used for useful transmissions 37% of time! Multiple Access Protocols Random access protocols November 11, 2013 13 / 57

Pure (unslotted) ALOHA unslotted Aloha: simpler, no synchronization when frame first arrives transmit immediately collision probability increases: frame sent at t0 collides with other frames sent in [t 0 1, t 0 + 1] Multiple Access Protocols Random access protocols November 11, 2013 14 / 57

Pure ALOHA efficiency P(success by given node) = P(node transmits) P(no other node transmits in [t 0 1, t 0 ] P(no other node transmits in [t 0 1, t 0 ] = p(1 p) N 1 (1 p) N 1 = p(1 p) 2(N 1)... choosing optimum p and then letting n = 1 2e = 0.18 even worse than slotted Aloha! Multiple Access Protocols Random access protocols November 11, 2013 15 / 57

CSMA (carrier sense multiple access) CSMA: listen before transmit: if channel sensed idle: transmit entire frame if channel sensed busy, defer transmission human analogy: don t interrupt others! Multiple Access Protocols CSMA (carrier sense multiple access) November 11, 2013 16 / 57

CSMA collisions collisions can still occur: collision: propagation delay means two nodes may not hear each other s transmission entire packet transmission time wasted distance and propagation delay play role in in determining collision probability Multiple Access Protocols CSMA (carrier sense multiple access) November 11, 2013 17 / 57

CSMA/CD (collision detection) CSMA/CD: carrier sensing, deferral as in CSMA collisions detected within short time colliding transmissions aborted, reducing channel wastage collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed by local transmission strength Human analogy: the polite conversationalist Multiple Access Protocols CSMA (carrier sense multiple access) November 11, 2013 18 / 57

CSMA/CD (collision detection) Multiple Access Protocols CSMA (carrier sense multiple access) November 11, 2013 19 / 57

Ethernet CSMA/CD algorithm 1 NIC receives datagram from network layer, creates frame 2 If NIC senses channel idle, starts frame transmission. If NIC senses channel busy, waits until channel idle, then transmits. 3 If NIC transmits entire frame without detecting another transmission, NIC is done with frame! 4 If NIC detects another transmission while transmitting, aborts and sends jam signal 5 After aborting, NIC enters binary (exponential) backoff: after m th collision, NIC chooses K at random from {0, 1, 2,, 2 m 1 }. NIC waits K 512 bit times, returns to Step 2 longer backoff interval with more collisions Multiple Access Protocols CSMA (carrier sense multiple access) November 11, 2013 20 / 57

CSMA/CD efficiency t prop = max prop delay between 2 nodes in LAN t trans = time to transmit max-size frame efficiency goes to 1 as t prop goes to 0 as t trans goes to infinity efficiency = 1 1+5 tprop ttrans better performance than ALOHA: and simple, cheap, decentralized! Multiple Access Protocols CSMA (carrier sense multiple access) November 11, 2013 21 / 57

Taking turns MAC protocols channel partitioning MAC protocols: share channel efficiently and fairly at high load inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node! random access MAC protocols efficient at low load: single node can fully utilize channel high load: collision overhead taking turns protocols look for best of both worlds! Multiple Access Protocols Taking turns MAC protocols November 11, 2013 22 / 57

Taking turns MAC protocols polling: master node invites slave nodes to transmit in turn typically used with dumb slave devices concerns: polling overhead latency single point of failure (master) Multiple Access Protocols Taking turns MAC protocols November 11, 2013 23 / 57

Taking turns MAC protocols token passing: control token passed from one node to next sequentially. token message concerns: token overhead latency single point of failure (token) Multiple Access Protocols Taking turns MAC protocols November 11, 2013 24 / 57

Taking turns MAC protocols token passing: control token passed from one node to next sequentially. token message concerns: token overhead latency single point of failure (token) Multiple Access Protocols Taking turns MAC protocols November 11, 2013 24 / 57

Taking turns MAC protocols token passing: control token passed from one node to next sequentially. token message concerns: token overhead latency single point of failure (token) Multiple Access Protocols Taking turns MAC protocols November 11, 2013 24 / 57

Taking turns MAC protocols token passing: control token passed from one node to next sequentially. token message concerns: token overhead latency single point of failure (token) Multiple Access Protocols Taking turns MAC protocols November 11, 2013 24 / 57

Taking turns MAC protocols token passing: control token passed from one node to next sequentially. token message concerns: token overhead latency single point of failure (token) Multiple Access Protocols Taking turns MAC protocols November 11, 2013 24 / 57

Cable access network multiple 40Mbps downstream (broadcast) channels single CMTS transmits into channels multiple 30 Mbps upstream channels multiple access: all users contend for certain upstream channel time slots (others assigned) Multiple Access Protocols Taking turns MAC protocols November 11, 2013 25 / 57

Cable access network DOCSIS: data over cable service interface spec FDM over upstream, downstream frequency channels TDM upstream: some slots assigned, some have contention downstream MAP frame: assigns upstream slots request for upstream slots (and data) transmitted random access (binary backoff) in selected slots Multiple Access Protocols Taking turns MAC protocols November 11, 2013 26 / 57

Summary of MAC protocols channel partitioning, by time, frequency or code Time Division, Frequency Division random access (dynamic) ALOHA, S-ALOHA, CSMA, CSMA/CD carrier sensing: easy in some technologies (wire), hard in others (wireless) CSMA/CD used in Ethernet CSMA/CA used in 802.11 taking turns polling from central site, token passing bluetooth, FDDI, token ring Multiple Access Protocols Summary of MAC protocols November 11, 2013 27 / 57

Wifi Introduction Wifi Introduction November 11, 2013 28 / 57

Mobility wireless: communication over wireless link mobility: handling the mobile user who changes point of attachment to network Wifi Introduction November 11, 2013 29 / 57

Elements Wireless hosts Wifi Introduction November 11, 2013 30 / 57

Elements Wireless hosts Base station Wifi Introduction November 11, 2013 30 / 57

Elements Wireless hosts Base station Wireless link Wifi Introduction November 11, 2013 30 / 57

Characteristics of selected wireless links Wifi Introduction November 11, 2013 31 / 57

Wireless network taxonomy infrastructure (e.g., APs) no infrastructure single hop host connects to base station (WiFi, WiMAX, cellular) which connects to larger Internet no base station, no connection to larger Internet (Bluetooth, ad hoc nets) multiple hops host may have to relay through several wireless nodes to connect to larger Internet: mesh net no base station, no connection to larger Internet. May have to relay to reach other a given wireless node MANET, VANET Wifi Introduction November 11, 2013 32 / 57

Wireless links Wireless links November 11, 2013 33 / 57

Wireless links Characteristics important differences from wired link... decreased signal strength: radio signal attenuates as it propagates through matter (path loss) interference from other sources: standardized wireless network frequencies (e.g., 2.4 GHz) shared by other devices (e.g., phone); devices (motors) interfere as well multipath propagation: radio signal reflects off objects ground, arriving ad destination at slightly different times... make communication across (even a point to point) wireless link much more difficult Wireless links November 11, 2013 34 / 57

Wireless links Characteristics SNR: signal-to-noise ratio larger SNR easier to extract signal from noise (a good thing ) SNR versus BER tradeoffs given physical layer: increase power increase SNR decrease BER given SNR: choose physical layer that meets BER requirement, giving highest througput SNR may change with mobility: dynamically adapt physical layer (modulation technique, rate) Wireless links November 11, 2013 35 / 57

Wireless network Characteristics Multiple wireless senders and receivers create additional problems (beyond multiple access): Hidden terminal problem B, A hear each other B, C hear each other A, C can not hear each other means A, C unaware of their interference at B Signal attenuation: B, A hear each other B, C hear each other A, C can not hear each other interfering at B Wireless links November 11, 2013 36 / 57

Code Division Multiple Access (CDMA) Unique code assigned to each user; i.e., code set partitioning all users share same frequency, but each user has own chipping sequence (i.e., code) to encode data allows multiple users to coexist and transmit simultaneously with minimal interference (if codes are orthogonal ) Encoded signal = (original data) (chipping sequence) Decoding: inner-product of encoded signal and chipping sequence Wireless links November 11, 2013 37 / 57

CDMA encode/decode Wireless links November 11, 2013 38 / 57

CDMA: two-sender interference Wireless links November 11, 2013 39 / 57

IEEE 802.11 wireless LANs ( Wi-Fi ) IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 40 / 57

IEEE 802.11 wireless LAN 802.11b 2.4-5 GHz unlicensed spectrum - up to 11 Mbps direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code 802.11a 5-6 GHz range - up to 54 Mbps 802.11g 2.4-5 GHz range - up to 54 Mbps 802.11n: multiple antennae 2.4-5 GHz range - up to 200 Mbps all use CSMA/CA for multiple access all have base-station and ad-hoc network versions IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 41 / 57

802.11 LAN architecture wireless host communicates with base station base station = access point (AP) Basic Service Set (BSS) (aka cell ) in infrastructure mode contains: wireless hosts access point (AP): base station ad hoc mode: hosts only IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 42 / 57

802.11: Channels, association 802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels at different frequencies AP admin chooses frequency for AP interference possible: channel can be same as that chosen by neighboring AP! host: must associate with an AP scans channels, listening for beacon frames containing AP s name (SSID) and MAC address selects AP to associate with may perform authentication [Chapter 8] will typically run DHCP to get IP address in AP s subnet IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 43 / 57

802.11: passive/active scanning passive scanning: 1 beacon frames sent from APs 2 association Request frame sent: H1 to selected AP 3 association Response frame sent from selected AP to H1 active scanning: 1 Probe Request frame broadcast from H1 2 Probe Response frames sent from APs 3 Association Request frame sent: H1 to selected AP 4 Association Response frame sent from selected AP to H1 IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 44 / 57

IEEE 802.11: multiple access avoid collisions: 2+ nodes transmitting at same time 802.11: CSMA - sense before transmitting don t collide with ongoing transmission by other node 802.11: no collision detection! difficult to receive (sense collisions) when transmitting due to weak received signals (fading) can t sense all collisions in any case: hidden terminal, fading goal: avoid collisions: CSMA/C(ollision)A(voidance) IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 45 / 57

IEEE 802.11 MAC Protocol: CSMA/CA 802.11 sender 1 if sense channel idle for DIFS then transmit entire frame (no CD) 2 if sense channel busy then start random backoff time timer counts down while channel idle transmit when timer expires if no ACK, increase random backoff interval, repeat 2 802.11 receiver 1 if frame received OK return ACK after SIFS (ACK needed due to hidden terminal problem) IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 46 / 57

Avoiding collisions (more) idea: allow sender to reserve channel rather than random access of data frames: avoid collisions of long data frames sender first transmits small request-to-send (RTS) packets to BS using CSMA RTSs may still collide with each other (but they re short) BS broadcasts clear-to-send CTS in response to RTS CTS heard by all nodes sender transmits data frame other stations defer transmissions IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 47 / 57

Avoiding collisions (more) idea: allow sender to reserve channel rather than random access of data frames: avoid collisions of long data frames sender first transmits small request-to-send (RTS) packets to BS using CSMA RTSs may still collide with each other (but they re short) BS broadcasts clear-to-send CTS in response to RTS CTS heard by all nodes sender transmits data frame other stations defer transmissions avoid data frame collisions completely using small reservation packets! IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 47 / 57

Collision Avoidance: RTS-CTS exchange IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 48 / 57

802.11 Frame: Addressing IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 49 / 57

802.11 Frame: Addressing IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 50 / 57

802.11 Frame: more IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 51 / 57

802.11: mobility within same subnet H1 remains in same IP subnet: IP address can remain same switch: which AP is associated with H1? self-learning (Ch. 5): switch will see frame from H1 and remember which switch port can be used to reach H1 IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 52 / 57

802.11: advanced capabilities Rate adaptation base station, mobile dynamically change transmission rate (physical layer modulation technique) as mobile moves, SNR varies IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 53 / 57

802.11: advanced capabilities power management node-to-ap: I am going to sleep until next beacon frame AP knows not to transmit frames to this node node wakes up before next beacon frame beacon frame: contains list of mobiles with AP-to-mobile frames waiting to be sent node will stay awake if AP-to-mobile frames to be sent; otherwise sleep again until next beacon frame IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 54 / 57

802.15: personal area network less than 10 m diameter replacement for cables (mouse, keyboard, headphones) ad hoc: no infrastructure master/slaves: slaves request permission to send (to master) master grants requests 802.15: evolved from Bluetooth specification 2.4-2.5 GHz radio band up to 721 kbps IEEE 802.11 wireless LANs ( Wi-Fi ) November 11, 2013 55 / 57

Summary sharing a broadcast channel: multiple access Wireless links (capacity, distance) IEEE 802.11 ( Wi-Fi ) incl CSMA/CA Summary November 11, 2013 56 / 57

Status journey down protocol stack complete (except PHY) solid understanding of networking principles, practice Briefly covered wifi Summary November 11, 2013 57 / 57

Status journey down protocol stack complete (except PHY) solid understanding of networking principles, practice Briefly covered wifi Next up: Security Summary November 11, 2013 57 / 57