ECE/CS 372 introduction to computer networks. Lecture 13



Similar documents
10. Wireless Networks

EPL 657 Wireless Networks

Data Center Networks, Link Layer Wireless (802.11)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

communication over wireless link handling mobile user who changes point of attachment to network

COMP 3331/9331: Computer Networks and Applications

Chapter 6 Wireless and Mobile Networks

Lecture 7 Multiple Access Protocols and Wireless

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Mobile and Sensor Systems

Chapter 6: Wireless and Mobile Networks

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

CS263: Wireless Communications and Sensor Networks

Wireless and Mobile Networks

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

How To Make A Multi-User Communication Efficient

Lecture 17: Wireless Networking"

Wiereless LAN

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

MAC Algorithms in Wireless Networks

Wireless LAN Concepts

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

IT4405 Computer Networks (Compulsory)

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Controlled Random Access Methods

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

CSE 123A Computer Networks

CSMA/CA. Information Networks p. 1

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Chapter 6 CDMA/802.11i

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Hello viewers, welcome to today s lecture on cellular telephone systems.

Wireless LAN Services for Hot-Spot

11/22/

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Wireless Personal Area Networks (WPANs)

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

CS Cellular and Mobile Network Security: CDMA/UMTS Air Interface

Modern Wireless Communication

Chapter 7 Low-Speed Wireless Local Area Networks

In this Lecture" Access method CDMA" Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Security in Ad Hoc Network

Introduction to Wireless Communications and Networks

Location management Need Frequency Location updating

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

Expert Reference Series of White Papers. Wireless Bandwidth Not Necessarily as Advertised COURSES.

Municipal Mesh Network Design

... neither PCF nor CA used in practice

CWNA Instructor Led Course Outline

Introduction to Ad hoc Networks

Introduction to Ethernet

RTT 60.5 msec receiver window size: 32 KB

Ethernet, VLAN, Ethernet Carrier Grade

ECE 428 Computer Networks and Security

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Mobile Ad Hoc Networks

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

Video Transmission over Wireless LAN. Hang Liu

Wi-Fi and Bluetooth - Interference Issues

Performance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE Kang Sun

Demystifying Wireless for Real-World Measurement Applications

Medium Access Control (MAC) and Wireless LANs

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

IEEE Ad Hoc Networks: Performance Measurements

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

Introduction Chapter 1. Uses of Computer Networks

Wireless Mesh Networks: WMN Overview, WMN Architecture

Based on Computer Networking, 4 th Edition by Kurose and Ross

Environmental Monitoring: Guide to Selecting Wireless Communication Solutions

1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Networking. Introduction. Types of Wireless Networks. A Build-It-Ourselves Guide to Wireless Mesh Networks

Random Access Protocols

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling

Telecommunications, Networks, and Wireless Computing

Energy Optimal Routing Protocol for a Wireless Data Network

Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet

On Backoff Mechanisms for Wireless. Mobile Ad Hoc Networks

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

EETS 8316 Wireless Networks Fall 2013

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO

Defining the Smart Grid WAN

Wave Relay System and General Project Details

Transcription:

ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement: slides drawn heavily from Kurose & Ross Chapter 6, slide 1

Wireless and Mobile Networks Background: success of wireless: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! Internet: anytime & anywhere: laptops, PDAs, tablets, iphones, MagicJack, IP-enabled devices two important (but different) challenges wireless: communication over wireless link mobility: handling the mobile user who changes point of attachment to network Wireless and Mobile Networks, slide 2

Elements of a wireless network wireless hosts network infrastructure e.g.: laptop, iphone run: applications stationary or mobile wireless does not always mean mobility Wireless and Mobile Networks, slide 3

Elements of a wireless network network infrastructure base station bridge: typically connected to wired network relay: responsible for sending pkts between backbone network and wireless host(s) e.g., cell towers, 802.11 access points Wireless and Mobile Networks, slide 4

Elements of a wireless network network infrastructure wireless link connects: mobiles to base station multiple access protocol: coordinates link access various data rates, transmission distance Wireless and Mobile Networks, slide 5

Elements of a wireless network network infrastructure infrastructure mode bridge: base station connects mobiles into wired network handoff: mobile changes base station providing connection into wired network Wireless and Mobile Networks, slide 6

Elements of a wireless network ad hoc mode no base stations limited range: nodes can only transmit to other nodes within link coverage multi-hop: nodes organize themselves into a network: route among themselves Wireless and Mobile Networks, slide 7

Wireless network taxonomy Infrastructure Infrastructure-less Single Hop 1. hosts connect to base station 2. base station connects to larger Internet E.g.: WiFi/Cellular 1. no base station 2. no connection to larger Internet E.g.: Bluetooth large large Internet Internet Multiple hops 1. hosts may have to relay via multiple nodes (multi-hop) 2. connects to larger Internet E.g.: mesh network 1. no base station 2. no connection to larger Internet 3. may have to relay via others to reach a given node E.g.: MANET Mobile Ad-Hoc Bluetooth Network WiFi Network (MANET) Network Mesh Network Wireless and Mobile Networks, slide 8

Outline Wireless wireless characteristics multiple access schemes TDMA/FDMA CDMA Wi-Fi wireless LANs CSMA/CA IEEE 802.11 Mobility principles: addressing routing to mobile users mobile IP Wireless and Mobile Networks, slide 9

Wireless Link Characteristics Differences from wired link. decayed signal strength: radio signal attenuates as it propagates through matter (path loss) interference from other sources: standardized wireless network frequencies (e.g., 2.4 GHz) shared by other devices (e.g., phone) multipath propagation: radio signal reflects off objects ground, arriving at destination at slightly different times. make communication across (even a point to point) wireless link much more difficult Wireless and Mobile Networks, slide 10

Wireless Network Characteristics Multiple wireless senders and receivers create additional problems (beyond multiple access): C A B C A B A s signal strength C s signal strength Hidden terminal problem B, A hear each other B, C hear each other A, C can not hear each other, meaning that A, C are unaware of their interference at B space Signal attenuation: B, A hear each other B, C hear each other A, C can not hear each other can interfere at B Wireless and Mobile Networks, slide 11

Outline Wireless wireless characteristics multiple access schemes TDMA/FDMA CDMA Wi-Fi wireless LANs CSMA/CA IEEE 802.11 Mobility principles: addressing routing to mobile users mobile IP Wireless and Mobile Networks, slide 12

Multiple Access Schemes Q: How can multiple users share the medium? FDMA: Frequency Division Multiple Access (seen before) TDMA: Time Division Multiple Access (seen before) CDMA: Code Division Multiple Access (i.e., Cellular) (will be discussed next) CSMA/CA: Carrier-Sense Multiple Access (i.e., Wi-Fi) (will be discussed later) Wireless and Mobile Networks, slide 13

FDMA and TDMA (review) FDMA Example: 4 users frequency TDMA time frequency time Wireless and Mobile Networks, slide 14

CDMA all users use all frequency (like TDMA) all users send at all time (like FDMA) allows multiple users to coexist and transmit simultaneously a unique code assigned to each user encoding at sender: (original data) x (code) decoding at receiver: (encoded signal) x (code) Wireless and Mobile Networks, slide 15

CDMA Encode/Decode: one sender only Each user is assigned a unique code: c m = [-1-1 -1 1-1 1 1 1] (length of c m is M = 8 in this example) d = (1,0) = (1,-1) sender Sent bits: d i Code: c m d 1 = -1 1 1 1 1-1 - 1-1 - 1 d 0 = 1 1 1 1 1-1 - 1-1 - 1 2 nd bit 1 st bit We use -1 to mean 0 Channel output Z i,m = d i. cm Z 1,m = d 1. c m - 1-1 - 1 1-1 1 1 1 2 nd bit channel output Z 0,m = d 0. c m 1 1 1 1-1 - 1-1 - 1 1 st bit channel output Z 1,m = d 1. c m Z 0,m = d 0. c m Decoding at receiver: d i = (Z i,m. cm )/8 = (d i. cm. cm )/8 = d i receiver Received bits Code: c m - 1-1 - 1 1-1 1 1 1 1 1 1 1-1 - 1-1 - 1 1 1 1 1-1 - 1-1 - 1 1 1 1 1-1 - 1-1 - 1 d 1 = -1 decoded 2 nd bit d 0 = 1 decoded 1 st bit 2 nd bit 1 st bit Note that c m.c m = 8 Wireless and Mobile Networks, slide 16

CDMA: two-senders and interference Wireless and Mobile Networks, slide 17

CDMA: two-senders and interference M = length of c m Wireless and Mobile Networks, slide 18

CDMA: Example of multiple users Codeword v = (v0, v1), M=2 Data to send i.e. 1011 Transmitted word = (v, -v, v, v) Two users User 1 code = (1,-1), data = (1,0,1,1) User 2 code = (1,1), data = (0,0,1,1) User 1 transmits (1,-1, -1, 1, 1, -1, 1, -1) User 2 transmits (-1, -1, -1, -1, 1, 1, 1, 1) Signal = (0, -2, -2, 0, 2, 0, 2, 0) Receiver = (1, -1) (0, -2, -2, 0, 2, 0, 2, 0) => (2, -2, 2, 2) = (1, 0, 1, 1) Receiver = (1,1) (0, -2, -2, 0, 2, 0, 2, 0) => (-2, -2, 2, 2) = (0, 0, 1, 1) Wireless and Mobile Networks, slide 19

Wireless networks CSMA/CD Ethernet, interference not as serious as WiFi, what to do when collisions are detected CDMA Cellular, central entity (TDMA and FDMA like) CSMA/CA WiFi 2.4ghz spectrum hard to assign codes/ frequencies to manage allocations for all WiFi devices, don t know who will be transmitting, can t detect collisions as with Ethernet so try to avoid them Generally you can expect to see CSMA like protocols anytime you don t have control over who can access the medium FDMA, TDMA and CDMA type protocols will be in place when you have central control where each device will register and request segment of medium Wireless and Mobile Networks, slide 20

Outline Wireless wireless characteristics multiple access schemes TDMA/FDMA CDMA Wi-Fi wireless LANs CSMA/CA IEEE 802.11 Mobility principles: addressing routing to mobile users mobile IP Wireless and Mobile Networks, slide 21

IEEE 802.11: multiple access There are two access operating modes Infrastructure based mode Ad hoc based mode Wireless and Mobile Networks, slide 22

IEEE 802.11: multiple access There are two multiple access functions: Point Coordination Function (PCF) TDMA-like access Point Coordinator (PC) polls users in a roundrobin fashion No contention Synchronous Infrastructure mode Distributed Coordination function (DCF) CSMA-like access Random access: listenbefore-talk Contention-like medium Asynchronous Both infrastructure and adhoc modes Wireless and Mobile Networks, slide 23

IEEE 802.11 multiple access Contention and contention free periods: CFP CP CFP CP Contention-Free Period (CFP) Synchronous traffic Point Coord. Fct (PCF) is the access method (optional, very few APs or adapters implement this) Contention Period (CP) Asynchronous traffic Distr. Coord. Fct (DCF) is the access method Access point alternates between CFP and CP modes Wireless and Mobile Networks, slide 24

IEEE 802.11 DCF MAC one at a time: 2 + nodes send at same time => collision CSMA - sense before transmitting don t collide with ongoing transmission by other node no collision detection difficult to sense collision when transmitting due to weak sigl goal: avoid collisions: CSMA/C(ollision)A(voidance) use Acknowledgment mechanism to recover from collision C A B C A B A s signal strength C s signal strength space Two scenarios where collision cannot be detected Wireless and Mobile Networks, slide 25