Lectures 14: LAN technologies: Token Rings, Wireless LANs

Similar documents
TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

EPL 657 Wireless Networks

CSMA/CA. Information Networks p. 1

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

... neither PCF nor CA used in practice

Wireless LAN Concepts

CS263: Wireless Communications and Sensor Networks

Controlled Random Access Methods

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

How To Make A Multi-User Communication Efficient

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Introduction to Ethernet

ECE/CS 372 introduction to computer networks. Lecture 13

Wireless Personal Area Networks (WPANs)

Wiereless LAN

Chapter 7 Low-Speed Wireless Local Area Networks

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

CSE 123A Computer Networks

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Lecture 17: Wireless Networking"

Wired & Wireless LAN Connections

Lecture 7 Multiple Access Protocols and Wireless

Real-Time (Paradigms) (51)

Wi-Fi and Bluetooth - Interference Issues

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

RTT 60.5 msec receiver window size: 32 KB

Performance Evaluation of Wired and Wireless Local Area Networks

Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Adaptive DCF of MAC for VoIP services using IEEE networks

Random Access Protocols

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts


What s so smart about Smart-hopping?

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Hello viewers, welcome to today s lecture on cellular telephone systems.

ECE 333: Introduction to Communication Networks Fall 2002

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Ring Local Area Network. Ring LANs

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

Ethernet, VLAN, Ethernet Carrier Grade

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Algorithms for Interference Sensing in Optical CDMA Networks

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Module 15: Network Structures

An Overview of Wireless LAN Standards IEEE and IEEE e

IEEE Technical Tutorial. Introduction. IEEE Architecture

Network Topologies. Network Topologies

Demystifying Wireless for Real-World Measurement Applications

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

MAC Algorithms in Wireless Networks

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

10. Wireless Networks

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

TCP in Wireless Networks

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Video Transmission over Wireless LAN. Hang Liu

Chapter 14: Distributed Operating Systems

Bluetooth voice and data performance in DS WLAN environment

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

WIRELESS ETHERNET (IEEE )

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

QoS issues in Voice over IP

Chapter 16: Distributed Operating Systems

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Level 2 Routing: LAN Bridges and Switches

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

Spring Final Project Report

Based on Computer Networking, 4 th Edition by Kurose and Ross

Wireless and Mobile Networks

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

IT4405 Computer Networks (Compulsory)

Telecommunications, Networks, and Wireless Computing

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

SmartDiagnostics Application Note Wireless Interference

New protocol concept for wireless MIDI connections via Bluetooth

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Transcription:

Lectures 14: LAN technologies: Token Rings, Wireless LANs Slide 1

Token rings Token rings were developed by IBM in early 1980 s IEEE Standard 802.5 Token: a bit sequence Token circulates around the ring Busy token: 01111111 Free token: 01111110 Token Ring When a node wants to transmit Wait for free token Remove token from ring (replace with busy token) Transmit message When done transmitting, replace free token on ring Nodes must buffer 1 bit of data so that a free token can be changed to a busy token Token ring is basically a polling system Token does the polling Slide 2

Release of token Release after transmission Node replaces token on ring as soon as it is done transmitting the packet Next node can use token after short propagation delay Release after reception Node releases token only after its own packet has returned to it Serves as a simple acknowledgement mechanism Slide 3

PACKET TRANSMISSION (release after transmission) When not transmitting their own packets nodes relay whatever they receive After receiving an idle token a node can start sending a new packet (discard incoming bits) After a node sends a packet and the idle token, it sends idle fill until: The packet followed by idle, or busy token, returns around the ring Transmitted bits <-one time unit-> BT Packet BT New packet IT Idle fill BT Packet BT Packet IT Idle fill BT Packet return BT Packet Received bits Slide 4

PACKET TRANSMISSION (release after reception) In many implementations (including IEEE802.5, but not including FDDI), a node waits to check its packet return before sending the idle token. This increases packet transmission time by one round trip delay. BT Packet Idle fill BT New packet Idle fill IT Idle fill BT BT Packet Idle fill IT Idle fill BTPacket return Idle fill BT Slide 5

Delay analysis System can be analyzed using multi-user reservation results Exhaustive system - nodes empty their queue before passing token on to the next node Assume m nodes and each with Poisson arrivals of rate λ/m Let v = average propagation and token transmission delay System can be viewed as a reservation system with m users and average reservation interval (see reservation system results) W =!E[X 2 ] + v(m " #) 2(1" #), # = m(! / m)e[x] =!E[X ] Slide 6 Notice that 100% throughput can be achieved for exhaustive system

Throughput analysis (non-exhaustive) Gated system with limited service - each node is limited to sending one packet at a time When system is heavily loaded nodes are always busy and have a packet to send Suppose each node transmits one packet and then releases the token to the next node V i = propagation and transmission time for token between two nodes (transmission time is usually negligible) The amount of time to transmit N packets T N = N*E[X] + V 1 + V 2 + + V N = N*E[X] + N*E[V] λ < N*E[X]/(N*E[X] + N*E[V]) = 1/(1+E[V]/E[X]) Compare to CSMA/CD, but notice that V is the delay between two nodes and not the maximum delay on the fiber Slide 7

Throughput analysis (token release after reception) Nodes release token only after it has returned to it Again assume each node sends one packet at a time Total time to send ONE packet T = E[X] + V 1 + V 2 + + V m + V i Time to send token to next node M nodes on the ring T = E[X] + (m+1)e[v] => λ < E[X]/T = 1/(1+(m+1)E[V]/E[X]) Slide 8

Delay Analysis Release after transmission Partially gated limited service system (sec. 3.5.2) W =!E[X 2 ] + v(m +!E[X]) 2(1 "!E[X ]"!v) Release after reception Homework problem 4.27 Additional round-trip time can be added to the packet transmission time W =!(E[X2 ] + 2mv + m 2 v 2 ) + v(m +!(E[X] + mv)) 2(1 "!(E[X] + (m +1)v)) Slide 9

Token ring issues Fairness: Can a node hold the token for a long time Solution: maximum token hold time Token failures: Tokens can be created or destroyed by noise Distributed solution: Nodes are allowed to recognize the loss of a token and create a new token Collision occurs when two or more nodes create a new token at the same time => need collision resolution algorithms Node failures: Since each node must relay all incoming data, the failure of a single node will disrupt the operation of the ring Token ring standard: IEEE 802.5 Slide 10

Token Ring Example: FDDI Fiber distributed data interface (FDDI) is a 100 Mbps Fiber Optic Token Ring network standard FDDI uses two counter-rotating rings Single faults can be isolated by switching from one ring to the other on each side of fault (loop back) Only one ring used under normal operation (one direction) 1 Token release after transmission 7 2 Limit on token hold time 3 Upper-bound on time between token visits at a node Support for guaranteed delays Imposes a limit on the size of a ring (distance between nodes, number of nodes) 6 5 4 FDDI designed to be a metro or campus area network technology Slide 11

Resilient Packet Rings (RPR) (IEEE 802.17 standard) Uses two counter rotating rings Both rings used for working traffic, using shortest path routing Buffer insertion mechanism (instead of token) If no frame to forward, insert your own frame Failure recovery Allows for both loop-back link protection and end-to-end path protection Sophisticated (i.e., complex) QoS mechanisms Class A: low latency and low jitter Class B: predictable latency and jitter Class C: best effort Successful in MANs where reliability and QoS are critical Slide 12

Wireless Networking Technologies SHORT < RANGE > LONG ZigBee Bluetooth 802.16 (wimax) 802.11b 802.11a/g/n WiMedia Wireless Metropolitan Area Network Wireless Local Area Network Wireless Personal Area Network Slide 13 LOW < DATA RATE > HIGH Standards typically define the Medium Access Control (MAC) and the Physical layers Data rate Link length application Bluetooth 2.1 Mbps 10 meters Peripheral devices WiFi (802.11) 54 Mbps 100 meters Access Most slides on wireless MAC borrowed with permission from Prof. Gil Zussman of Columbia University LAN WiMax (802.16) 70 Mbps 10 km

Medium Access Control (MAC) Nodes are scattered in a geographic area Need to somehow coordinate the access to channel Transmission time, power, rate, etc. 2 4 Centralized Managed by an Access Point/Base Station Distributed 1 3 6 Random access (Aloha, CSMA, Ethernet) 5 Scheduled access 7 8 Requirements Throughput, delay, fairness, energy efficiency Slide 14

IEEE 802.11 / WiFi Set of standards for Wireless Local Area Networks (WLANs) Define Medium Access Control (MAC) Physical layer Most common 802.11g Maximum data rate: 54Mb/s Frequency band: 2.4 Ghz Other variations 802.11a,b,e,n Different bands, physical layers, data rates, QoS, etc. Slide 15

Ad Hoc and Infrastructure Modes Ad Hoc mode The stations communicate with one another Not connected to a larger network Infrastructure mode An Access Point connects Stations to a wired network Overlapping Access Points connected to each other Allows Stations to roam between Access Points Slide 16

Medium Access Control - CSMA\CA Carrier Sense Multiple Access \ Collision Avoidance Station wishing to transmit a Data packet senses the medium If it is idle for a given period - Transmits ACK packet is sent by the receiving station Collision assumed if sending station doesn t get ACK Data is retransmitted after a random time CSMA B Station A Station B Data Ack A Slide 17

Medium Access Control - CSMA\CA Carrier Sense Multiple Access \ Collision Avoidance B Station A Data Station B Ack Station C Don t Transmit! A C CA A station that heard the Data or the ACK, knows the time remaining until the medium will become available Will not try to transmit during that time Carrier Sensing Physical Slide 18 Virtual: using RTS/CTS procedure and NAV values within

Hidden Node Problem Hidden Node - A node that a station does not hear but can interfere with its transmissions Solution: Busy tone multiple access (Tobagi, 1975) Enhancement: A B Request to Send (RTS) B A Clear to Send (CTS) A B Data B A ACK CA A B C Neighboring nodes will keep quiet for the duration of the transfer Network allocation vector (NAV) - specifies duration of transfer Station A RTS Data Station B CTS Ack Slide 19 Station C Don t Transmit!

Contention Window A station that sensed the medium busy or did not receive an ACK will try to retransmit Station A Station B Data Ack Station C Don t Transmit! Contention Window (CW) The back-off interval is uniformly distributed within the CW The window is doubled every time there is a need to retransmit Upper limit on CW Count down back-off interval when channel idle Stop counting when busy (resume when idle again) Transmit when back-off interval reaches 0 Slide 20 B=10 9 8 7 6 5 Channel busy Channel idle 4 3 2 1 0 Data ACK Channel idle

Bluetooth Very short-range communications between computers and peripheral devices E.g., replace connector cables such as usb Operates in 2.4 GHz unlicensed band Uses spread-spectrum communications Frequency hopping between 79 frequency channels New frequency every slot (625 µs) Piconet: master and 7 slave devices All communication goes through the master ZigBee - a competing technology (will not discuss much) Newer technology for low bandwidth, low power applications Very simple and inexpensive Designed for sensor networks; and communications between very inexpensive devices (e.g., appliances) Slide 21

Bluetooth MAC Frequency Hop / Time Division Duplex Scheme Frequency band: 2.4 GHz ISM Band 1,600 slots per second (625 µs/slot) Piconet - A Master and up to 7 Slaves sharing a common hopping pattern Intra-Piconet Communication (TDD): Master Slave 1 Slave 2 Slave n Slide 22

Bluetooth MAC Master Slave 1 Slave 2 Slave n 1, 3, and 5-slot data frames If the master has no data to transmit, it can address a slave by sending a 1-slot POLL packet If a slave has nothing to send, it must respond by sending a 1-slot NULL packet Slide 23

Multi-hop Topology Several piconets may coexist in the same coverage area with minimal interference A unit can be: Piconet Coordinator / Device / Bridge There are links and neighbors Slide 24

WiMAX (802.16) Access technology - metro area Last (few) miles to home or business Data rates of up to 70 Mbps Physical layer Microwave band: 10 to 66 GHz (line of sight) Other bands also possible Connection oriented to offer QoS guarantees Medium access Fixed assignment (guaranteed rate) Reservations (polling) Contention mechanism for best effort services Slide 25

Simple Interference Model Primary interference constraints (e.g. Bluetooth) A node transmits to a single neighbor at a time Multiple transmissions can take place as long as they do not share a common node 1 4 2 3 6 5 7 8 The set of active links is a matching Slide 26

Large propagation delay (satellite networks) A = mv 1 2 3 4 5 Reservation Interval Frame Data Interval Reservation Interval Arrival Propagation Delay Res Data Res Data Res Data Transmit Res Wait for Reservation Interval Wait for Assigned Data Slot Satellite reservation system Use mini-slots to make reservation for longer data slots Mini-slot access can be inefficient (Aloha, TDMA, etc.) To a crude approximation, delay is 3/2 times the propagation delay plus ideal queueing delay. Slide 27

Satellite Reservations Frame length must exceed round-trip delay Reservation slots during frame j are used to reserve data slots in frame j+1 Variable length: serve all requests from frame j in frame j+1 Difficult to maintain synchronization Difficult to provide QoS (e.g., support voice traffic) Fixed length: Maintain a virtual queue of requests Reservation mechanism Scheduler on board satellite Scheduler on ground Distributed queue algorithm All nodes keep track of reservation requests and use the same algorithm to make reservation Control channel access TDMA: Simple but difficult to add more users Aloha: Can support large number of users but collision resolution can be difficult and add enormous delay Slide 28

Packet multiple access summary Latency: Ratio of propagation delay to packet transmission time GEO example: Dp = 0.5 sec, packet length = 1000 bits, R = 1Mbps Latency = 500 => very high LEO example: Dp = 0.1 sec Latency = 100 => still very high Over satellite channels data rate must be very low to be in a low latency environment Low latency protocols CSMA, Polling, Token Rings, etc. Throughput ~ 1/(1+aα), α = latency, a = constant High latency protocols Aloha is insensitive to latency, but generally low throughput Very little delays Reservation system can achieve high throughput Delays for making reservations Protocols can be designed to be a hybrid of Aloha and reservations Aloha at low loads, reservations at high loads Slide 29