Communication Networks: Technology & Protocols

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Broadcast network access control Some slides used.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
ECE 4450:427/527 - Computer Networks Spring 2015
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
WLAN.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Wireless Sensor Networks 4. Medium Access
Chapter 15 Wireless LANs.
Wireless Technologies
Outline What is Wireless LAN Wireless Transmission Types
IT351: Mobile & Wireless Computing
Medium Access Control MAC protocols: design goals, challenges,
The University of Adelaide, School of Computer Science
CT301 LECTURE 8.
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
Wireless Networks.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Medium Access Control (MAC) Sub-layer
CS 457 – Lecture 7 Wireless Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
THE IEEE MAC SUB-LAYER – chapter 14
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
Mobile Communications Chapter 3 : Media Access
EEC-484/584 Computer Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks
Overview Jaringan Komputer (3)
He Xiaoben Further study of multi-hop communications - modeling the hidden terminal problem He Xiaoben
The Medium Access Control Sublayer
Introduction to Wireless Networks
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Wireless LAN Simulation IEEE MAC Protocol
EEC-484/584 Computer Networks
ECSE-4730: Computer Communication Networks (CCN)
Conducted and Wireless Media (Part II)
Mozafar Bag-Mohammadi University of Ilam
Wireless LANs CS 352, Lecture 16
Wireless LAN Protocols
Dr. John P. Abraham Professor UTPA
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

Communication Networks: Technology & Protocols Stavros Tripakis (stavros@eecs) Lecture 17 October 1

FDDI example: When node i receives the token: THTi := TTRT - TRTi; Transmit synchronous traffic for Si time units. If THTi > 0, then transmit asynchronous traffic until THTi reaches 0. >TTRT 1 2 3 n 1 2 3 n 1 ... ... ... time TTRT/2 TTRT/2 S2 S3 Sn S1 THT1=TTRT/2 THT1<0

FDDI analysis Can prove that for each node i : TRTi < 2 TTRT. This implies that the medium access timeis at most 2 TTRT. Note book error: assumption 2TTRT <  to be replaced by TTRT > . Efficiency: close to 100%.

Wireless LANs Unique features of wireless networks. Emerging standards: Europe: ETSI Hiperlan US: IEEE 802.11 Emerging products: WaveLan (Lucent) Metricom Ricochet Nokia etc.

Characteristics of wireless networks Medium: 3D space. Signals: radio waves on specific frequencies. Frequency is a precious resource. “Difficult” medium: Interference, noise, shadowing, multipath effect. Higher bit-error rates, lower capacity (1-2Mbps). Power limitations  non-broadcast medium. Carrier-sense not very helpful. Collision-detection would require full-duplex radio channel  too expensive. Mobility of hosts.

Simplified view of wireless network B D A E C Range of D

Difficulties for carrier-sense and collision-detection. B C D Hidden-terminal problem : A cannot “hear” C transmitting. If A wants to transmit to B and hears nothing, it cannot assume that collision won’t happen, so carrier-sense does not help. Collision-detection not possible at sender’s side. Exposed-terminal problem : C can hear B transmitting but does not know who the receiver is. C can still transmit to D while B transmits (to A or some other node) without the two signals interfering at the receivers’ sides.

ALOHA protocol Multiple access without carrier-sense or collision-detection (two terminals cannot hear each other). Two versions: Pure ALOHA: a station can transmit at any time. Slotted ALOHA: time divided into slots (each slot is enough for 1 packet), stations can transmit only at the beginning of a slot. Better performance, harder to implement (need to synchronize clocks).

ETSI Hiperlan standard transmission

IEEE 802.11 standard Physical and MAC specifications. “Open” standard, leaves many possibilities for implementation  not clear whether different 802.11-compliant devices can inter-operate. Physical: Unlicensed bands, e.g., in US: 900MHz, 2.4GHz, 5.7GHz. Various restrictions on use. Direct-sequence or Frequency-hopping spread-spectrum. MAC: different modes of operation: Centralized: a base station gives access to the nodes one-by-one. Distributed: CSMA/CA.

IEEE 802.11 MAC (cont’d) Carrier-sense: carrier sense

IEEE 802.11 MAC (cont’d) Collision-avoidance (stemmed from MACA protocol): Sender transmits special Request-to-send (RTS) packet: the packet contains the length of data to be sent, L. Receiver replies with Clear-to-send (CTS) packet: this packet also contains the length of data (same as before). Every node hearing the RTS remains quiet for CTS+L. Every node hearing the CTS remains quiet for L. If sender does not receive CTS, it knows the receiver is busy and does not transmit data. CTS/RTS packets may still collide, but they are small, so the probability of collisions is reduced.

IEEE 802.11 MAC: example Example: A B C D A B C D Time to send CTS + 10 A RTS(C,10) data B CTS(B,10) C 10 D