Chapter 6 Wireless and Mobile Networks

Slides:



Advertisements
Similar presentations
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Advertisements

6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We’re making these slides freely available.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
6: Wireless and Mobile Networks Wireless LANs.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
OVERVIEW Lecture 2 Wireless Networks Lecture 2: Wireless Networks 1.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Wireless,
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Wireless,
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: §§6.1–6.3, Kurose and Ross 1.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
ECE 4450:427/527 - Computer Networks Spring 2015
Lecture 1 Wireless Networks CPE 401/601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross All material copyright J.F.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer multiple.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Spring 2006 CPE :Wireless and Mobile Networks I 1 Special Topics in Computer Engineering Wireless and Mobile Networks: I Some of these Slides are.
CS 1652 Wireless and Mobile Networks Jack Lange University of Pittsburgh 1.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
5: DataLink Layer5-1 Slotted ALOHA Assumptions r all frames same size r time is divided into equal size slots, time to transmit 1 frame r nodes start to.
6-1 Last time □ Ethernet ♦ frame structure ♦ CSMA/CD algorithm □ Hubs ♦ physical-layer repeaters ♦ make one large collision domain □ Switches ♦ link-layer.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
COM594: Mobile Technology
Chapter 5 Link Layer A note on the use of these ppt slides:
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
Chapter 6 Wireless and Mobile Networks
University of Pittsburgh
Chapter 6 Wireless and Mobile Networks
Session 17 INST 346 Technologies, Infrastructure and Architecture
Services of DLL Framing Link access Reliable delivery
Multiple access.
2012 session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Some slides have been taken from: Computer.
Chapter 6 Wireless and Mobile Networks
CS 457 – Lecture 7 Wireless Networks
Ch. 6: Wireless and Mobile Networks
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
Elements of a wireless network
CMPE 252A : Computer Networks
University of Pittsburgh
EEC-484/584 Computer Networks
CMPE 252A : Computer Networks
Chapter 6 Wireless and Mobile Networks
Overview Jaringan Komputer (3)
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Chapter 6 Wireless and Mobile Networks
EEC-484/584 Computer Networks
CMPE 259 : Sensor networks/IoT
Elements of a wireless network
Link Layer: Multiple Access
Wireless LANs CS 352, Lecture 16
Elements of a wireless network
Chapter 6 Wireless and Mobile Networks
Presentation transcript:

Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: If you use these slides (e.g., in a class) that you mention their source (after all, we’d like people to use our book!) If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Wireless, Mobile Networks

Chapter 6 outline Mobility Wireless 6.1 Introduction 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs (“Wi-Fi”) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5 Principles: addressing and routing to mobile users 6.6 Mobile IP 6.7 Handling mobility in cellular networks 6.8 Mobility and higher-layer protocols 6.9 Summary Wireless, Mobile Networks

Random access protocols when node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes ➜ “collision”, random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) examples of random access MAC protocols: slotted ALOHA ALOHA CSMA, CSMA/CD, CSMA/CA Link Layer

Slotted ALOHA assumptions: operation: all frames same size time divided into equal size slots (time to transmit 1 frame) nodes start to transmit only slot beginning nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision operation: when node obtains fresh frame, transmits in next slot if no collision: node can send new frame in next slot if collision: node retransmits frame in each subsequent slot with prob. p until success Link Layer

Slotted ALOHA Pros: Cons: collisions, wasting slots 1 2 3 node 1 node 2 node 3 C S E Pros: single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons: collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet clock synchronization Link Layer

Slotted ALOHA: efficiency efficiency: long-run fraction of successful slots (many nodes, all with many frames to send) max efficiency: find p* that maximizes Np(1-p)N-1 for many nodes, take limit of Np*(1-p*)N-1 as N goes to infinity, gives: max efficiency = 1/e = .37 suppose: N nodes with many frames to send, each transmits in slot with probability p prob that given node has success in a slot = p(1-p)N-1 prob that any node has a success = Np(1-p)N-1 ! at best: channel used for useful transmissions 37% of time! Link Layer

Pure (unslotted) ALOHA unslotted Aloha: simpler, no synchronization when frame first arrives transmit immediately collision probability increases: frame sent at t0 collides with other frames sent in [t0-1,t0+1] Link Layer

Pure ALOHA efficiency … choosing optimum p and then letting N P(success by given node) = P(node transmits) . P(no other node transmits in [t0-1,t0] . P(no other node transmits in [t0,t0+1] = p . (1-p)N-1 . (1-p)N-1 = p . (1-p)2(N-1) … choosing optimum p and then letting N = 1/(2e) = .18 There should be N in the expression. Alternative analysis: Transmission attempts are Poisson (assuming infinite number of nodes and only n active (backlogged) nodes, and using the equivalence between binomial and Poisson). Then, inter-attempt times are i.i.d. exponential. Then, success = two successive inter-attempt times are both greater than 1. This occurs with probability e^{-2G(n)} where G(n) is the attempt rate (packets/time(s)). Throughput is G(n)e^{-2G(n)}, maximized when G(n)=1/2. even worse than slotted Aloha! Link Layer

CSMA (carrier sense multiple access) CSMA: listen before transmit: if channel sensed idle: transmit entire frame if channel sensed busy, defer transmission human analogy: don’t interrupt others! Link Layer

spatial layout of nodes CSMA collisions spatial layout of nodes collisions can still occur: propagation delay means two nodes may not hear each other’s transmission collision: entire packet transmission time wasted distance & propagation delay play role in in determining collision probability Link Layer

CSMA/CD (collision detection) CSMA/CD: carrier sensing, deferral as in CSMA collisions detected within short time colliding transmissions aborted, reducing channel wastage collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed by local transmission strength human analogy: the polite conversationalist Link Layer

CSMA/CD (collision detection) spatial layout of nodes Link Layer

Ethernet CSMA/CD algorithm 1. NIC receives datagram from network layer, creates frame 2. If NIC senses channel idle, starts frame transmission. If NIC senses channel busy, waits until channel idle, then transmits. 3. If NIC transmits entire frame without detecting another transmission, NIC is done with frame ! 4. If NIC detects another transmission while transmitting, aborts and sends jam signal 5. After aborting, NIC enters binary (exponential) backoff: after mth collision, NIC chooses K at random from {0,1,2, …, 2m-1}. NIC waits K·512 bit times, returns to Step 2 longer backoff interval with more collisions Link Layer

CSMA/CD efficiency Tprop = max prop delay between 2 nodes in LAN ttrans = time to transmit max-size frame efficiency goes to 1 as tprop goes to 0 as ttrans goes to infinity better performance than ALOHA: and simple, cheap, decentralized! Link Layer

Characteristics of selected wireless links 200 802.11n 54 802.11a,g 802.11a,g point-to-point 5-11 802.11b 4G: LTWE WIMAX 4 3G: UMTS/WCDMA-HSPDA, CDMA2000-1xEVDO Data rate (Mbps) 1 802.15 .384 2.5G: UMTS/WCDMA, CDMA2000 .056 2G: IS-95, CDMA, GSM Indoor 10-30m Outdoor 50-200m Mid-range outdoor 200m – 4 Km Long-range outdoor 5Km – 20 Km Wireless, Mobile Networks

Wireless network characteristics Multiple wireless senders and receivers create additional problems (beyond multiple access): A B C C C’s signal strength A’s signal strength B A space Hidden terminal problem B, A hear each other B, C hear each other A, C can not hear each other means A, C unaware of their interference at B Signal attenuation: B, A hear each other B, C hear each other A, C can not hear each other interfering at B Wireless, Mobile Networks

IEEE 802.11 Wireless LAN 802.11a 802.11b 5-6 GHz range up to 54 Mbps 802.11g 2.4-5 GHz range 802.11n: multiple antennae up to 200 Mbps 802.11b 2.4-5 GHz unlicensed spectrum up to 11 Mbps direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code all use CSMA/CA for multiple access all have base-station and ad-hoc network versions Wireless, Mobile Networks

802.11 LAN architecture wireless host communicates with base station base station = access point (AP) Basic Service Set (BSS) (aka “cell”) in infrastructure mode contains: wireless hosts access point (AP): base station ad hoc mode: hosts only Internet hub, switch or router BSS 1 BSS 2 Wireless, Mobile Networks

802.11: Channels, association 802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels at different frequencies AP admin chooses frequency for AP interference possible: channel can be same as that chosen by neighboring AP! host: must associate with an AP scans channels, listening for beacon frames containing AP’s name (SSID) and MAC address selects AP to associate with may perform authentication [Chapter 8] will typically run DHCP to get IP address in AP’s subnet Wireless, Mobile Networks

802.11: passive/active scanning AP 2 AP 1 H1 BBS 2 BBS 1 1 2 3 4 active scanning: Probe Request frame broadcast from H1 Probe Response frames sent from APs Association Request frame sent: H1 to selected AP Association Response frame sent from selected AP to H1 BBS 1 BBS 2 1 1 AP 1 AP 2 2 3 H1 passive scanning: beacon frames sent from APs association Request frame sent: H1 to selected AP association Response frame sent from selected AP to H1 Wireless, Mobile Networks

IEEE 802.11: multiple access avoid collisions: 2+ nodes transmitting at same time 802.11: CSMA - sense before transmitting don’t collide with ongoing transmission by other node 802.11: no collision detection! difficult to receive (sense collisions) when transmitting due to weak received signals (fading) can’t sense all collisions in any case: hidden terminal, fading goal: avoid collisions: CSMA/C(ollision)A(voidance) A B C A’s signal strength C’s signal A B C space Wireless, Mobile Networks

IEEE 802.11 MAC Protocol: CSMA/CA 802.11 sender 1 if sense channel idle for DIFS then transmit entire frame (no CD) 2 if sense channel busy then start random backoff time timer counts down while channel idle transmit when timer expires if no ACK, increase random backoff interval, repeat 2 802.11 receiver - if frame received OK return ACK after SIFS (ACK needed due to hidden terminal problem) sender receiver DIFS data SIFS ACK Wireless, Mobile Networks

Avoiding collisions (more) idea: allow sender to “reserve” channel rather than random access of data frames: avoid collisions of long data frames sender first transmits small request-to-send (RTS) packets to BS using CSMA RTSs may still collide with each other (but they’re short) BS broadcasts clear-to-send CTS in response to RTS CTS heard by all nodes sender transmits data frame other stations defer transmissions avoid data frame collisions completely using small reservation packets! Wireless, Mobile Networks

Collision Avoidance: RTS-CTS exchange B AP RTS(A) RTS(B) reservation collision RTS(A) CTS(A) defer DATA (A) ACK(A) time Wireless, Mobile Networks

802.11 frame: addressing Address 4: used only in ad hoc mode control duration address 1 2 4 3 payload CRC 6 0 - 2312 seq Address 4: used only in ad hoc mode Address 1: MAC address of wireless host or AP to receive this frame Address 3: MAC address of router interface to which AP is attached Address 2: MAC address of wireless host or AP transmitting this frame Wireless, Mobile Networks

802.11 frame: addressing Internet router H1 R1 R1 MAC addr H1 MAC addr AP MAC addr H1 MAC addr R1 MAC addr address 1 address 2 address 3 802.11 frame H1 R1 R1 MAC addr H1 MAC addr dest. address source address 802.3 frame Wireless, Mobile Networks

802.11 frame: more frame seq # (for RDT) duration of reserved transmission time (RTS/CTS) frame control duration address 1 2 4 3 payload CRC 6 0 - 2312 seq Type From AP Subtype To More frag WEP data Power mgt Retry Rsvd Protocol version 2 4 1 frame type (RTS, CTS, ACK, data) Wireless, Mobile Networks

802.11: mobility within same subnet H1 remains in same IP subnet: IP address can remain same switch: which AP is associated with H1? self-learning (Ch. 5): switch will see frame from H1 and “remember” which switch port can be used to reach H1 H1 BBS 2 BBS 1 Wireless, Mobile Networks

802.11: advanced capabilities Rate adaptation base station, mobile dynamically change transmission rate (physical layer modulation technique) as mobile moves, SNR varies 10-1 10-2 10-3 BER 10-4 10-5 10-6 10-7 10 20 30 40 SNR(dB) 1. SNR decreases, BER increase as node moves away from base station QAM256 (8 Mbps) QAM16 (4 Mbps) BPSK (1 Mbps) 2. When BER becomes too high, switch to lower transmission rate but with lower BER operating point Wireless, Mobile Networks

802.11: advanced capabilities power management node-to-AP: “I am going to sleep until next beacon frame” AP knows not to transmit frames to this node node wakes up before next beacon frame beacon frame: contains list of mobiles with AP-to-mobile frames waiting to be sent node will stay awake if AP-to-mobile frames to be sent; otherwise sleep again until next beacon frame Wireless, Mobile Networks