MITP 413: Wireless Technologies Week 8

Slides:



Advertisements
Similar presentations
Networks: Wireless LANs1 Wireless Local Area Networks.
Advertisements

– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
Network Technology CSE Network Technology CSE3020 Week 9.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
WLAN b a Johan Montelius
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Lecture #2 Chapter 14 Wireless LANs.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 05. MAC and Physical Layers.
Chapter 6 Multiple Radio Access
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
WLAN.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Wireless LAN By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal
Chapter 15 Wireless LANs.
Wireless MAC.
Wireless MAC.
EA C451 (Internetworking Technologies)
Medium Access Control MAC protocols: design goals, challenges,
The University of Adelaide, School of Computer Science
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Multiple Access Mahesh Jangid Assistant Professor JVW University.
CS 457 – Lecture 7 Wireless Networks
Wireless Local Area Networks (LANs)
WiFi Networks: IEEE b Wireless LANs
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
EEC-484/584 Computer Networks
Specification overview
Chapter 6 Medium Access Control Protocols and Local Area Networks
Wireless Local Area Network (WLAN)
Specification overview
basics Richard Dunn CSE July 2, 2003.
Protocol Details John Bellardo UCSD.
Introduction to Wireless Networks
Specification overview
Specification overview
Performance Evaluation of an Integrated-service IEEE Network
Wireless LAN Simulation IEEE MAC Protocol
Specification overview
EEC-484/584 Computer Networks
Specification overview
MITP 413: Wireless Technologies Week 7
Specification overview
WiFi Networks: IEEE b Wireless LANs
Chapter 6 Multiple Radio Access.
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

MITP 413: Wireless Technologies Week 8 Michael L. Honig Department of ECE Northwestern University May 2004

Cellular Call Setup 1. Call Request 2. Send numbers to switch 3. Page Receiver 4. Request Channel/Time slot/Code

Cellular Call Setup (cont.) 5. Switch assigns channels 6. Cellular conversation is set up

Multiple Access Control (MAC) Fixed assignment access Each user is assigned a dedicated channel, time slot, or code Appropriate for circuit-switched traffic, transferring long data files Random access: users contend for access to the channel Users may collide, losing packets. Sometimes can negotiate rate (bandwidth, time slots, codes) and power Widely used in wired networks Used in wireless networks for requesting channel/time slot/code

ALOHA-Based Random Access no Packet arrives Base station Sends ack transmit Collision? yes Transmitter does not Receive ack Packet is rescheduled With random delay Simple: asynchronous Low throughput under heavy loads (maximum is 18% of incoming packets) Slotted ALOHA Synchronous, maximum throughput increases to 36% Used in GSM to reserve a time slot for voice connection Reservation ALOHA Contention period followed by reserved message slots

ALOHA Protocols

Carrier Sense Multiple Access (CSMA) no Packet arrives Sense channel Busy? Transmit packet yes Delay transmission (non-persistent) “Listen before talk” (LBT) protocol Collisions occur if transmitters cannot sense the other transmission (e.g., due to large propagation delay) Lower probability of collision/higher throughput than ALOHA Long propagation times  more collisions ALOHA preferred for wide area applications

CSMA Example

Carrier Sensing Nonpersistent: After sensing a busy channel, the terminal senses the channel after a random waiting period Persistent: The terminal senses the channel until the channel becomes free. 1-Persistent: After the channel becomes free, the terminal transmits immediately. p-Persistent: The terminal transmits with probability p.

Binary Exponential Backoff no Packet arrives Base station Sends ack transmit Collision? yes Transmitter does not Receive ack Packet is rescheduled After R time slots After 1st collision: R=0 or 1 with equal probability After 2nd collision: R=0,1,2, or 3 with equal probability After ith collision (i=1,…,10): R is selected between 0 and 2i-1 R is random Time slot 2 X (maximum round trip delay) Maximum of 16 retries

Performance Throughput (S): Average number of successful packet transmissions per unit time. Normalized throughput: Percentage of successful packet transmissions Average Delay (D): Average waiting time before successful transmission Offered Traffic (G): Number of packet transmission attempts per packet time slot – includes both new arrivals and retransmissions. Performance depends on the propagation delay across the network relative to the packet duration.

Throughput vs. Offered Load

Delay vs. Throughput

CSMA with Collision Detection (CSMA/CD) Nodes detect a collision in progress, and stop transmitting before the entire packet is transmitted. Assumes nodes can hear each other when they are transmitting. Appropriate for wired channels. Problems with wireless channels: Nodes cannot transmit and receive at the same frequency at the same time. Not all nodes may be in range of each other.

Hidden Terminal Problem Station B Station A Station D Station C Coverage area for station A. A is transmitting to B. C wants to transmit to D. C may not sense A’s transmission, causing a collision at B.

Exposed Terminal Problem Station B Station A Station D Station C Coverage area for station B. B is transmitting to A. C wants to transmit to D. C senses B’s transmission, and does not transmit even though it would not cause interference at A.

Basic Problem Carrier sensing determines whether or not there are interfering sources near the transmitter, not the receiver.

Solutions Busy-tone multiple access (BTMA) Separate control channel used to indicate that the channel is idle or busy. An active station transmits a busy tone on the control channel. Each receiver that senses a busy tone turns on its own busy tone. Used in ad hoc networks. Digital or Data Sense Multiple Access (DSMA) Used in FDD cellular mobile data networks Forward channel periodically broadcasts a busy/idle bit for the reverse link. Mobile transmits if bit is in idle state; base station sets bit to busy. Not carrier sensing: sensing is performed after demodulation. Multiple Access with Collision Avoidance (MACA)

MACA Protocol (RTS/CTS) Receiver Transmitter Request to Send (RTS), packet length Clear to Send (CTS), packet length Data Ack Terminals receiving either an RTS or CTS must not transmit for the duration of the packet. (What if the terminal hears RTS but not CTS?) Collision occurs if multiple nodes transmit an RTS, or the CTS is not heard due to other interference. Collision  binary exponential back-off

Wireless Local Area Networks (WLANs) Low mobility, high data rates within confined region (building or campus) Competitive with other wireless data systems (3G, fixed wireless access) Unlicensed bands Industrial, Scientific, Medical (ISM): 2.4 GHz National Information Infrastructure (UNII): 5 GHz Must accept interference, therefore uses spread spectrum signaling, or random access with collision avoidance.

Overview of 802.11 Standard IEEE 802.11 2.4 GHz 850 to 950 nm FHSS DS-SS Diffuse IR 2 Mbps 4GFSK 1 Mbps 2GFSK 2 Mbps DQPSK 1 Mbps DBPSK IEEE 802.11b Extension 5.5 Mbps DQPSK-CCK 11 Mbps DQPSK-CCK

802.11b vs. 802.11a 802.11a 802.11b 2.4—2.485 Ghz Interference from Microwave, Bluetooth 3 non-overlapping channels (26 MHz) Max Speed 11 Mbps Direct Sequence Spread Spectrum (DSSS) CSMA/CA Many products available 5 Ghz range 5 channels Max Speed 54 Mbps Orthogonal Frequency Division Multiplexing (OFDM) CSMA/CA Some products available (Cisco, Proxim) Look at passive

Peer-to-Peer Configuration Single Cell Station C Station A A Service Set is a Collection of stations Station B Mobile devices are referred to as Stations. Each Station can communicate directly with another Station. System referred to as Independent Basic Service Set (IBSS)

Infrastructure Configuration Single Cell Station A Station B Station C Access Point Access Point is analogous to a cellular Base Station System referred to as Infrastructure Basic Service Set (BSS)

Extended BSS (EBSS) Configuration Distribution System (DS) BSS Distribution System is a wired network (L2/L3 devices) connecting BSS Connect APs via a wired network DS consist of Layer 2, Layer 3 devices System referred to as Extended BSS APs have a BSSID System has a SSID Basic Service Area

Association/Disassociation STA AP Probe Request Probe Response Authenticate Associate Request Mention that this is Active Scanning. Where it can go around scanning different frequencies? Passive Scanning is to wait for a Beacon. On Authentication, STA gets an Association Identifier. Associate Response Disassociate (No ack)

802.11b: Physical Layer CCK (Complementary Code Keying): Each 8-bit “symbol” is mapped to 8 four-phase (QPSK) symbols. The signatures (codes) are orthogonal.

802.11 Protocol Architecture Logical link control Contention-free service Contention service Point Coordination Function (PCF) MAC Layer Distributed Coordination Function (DCF) Air interface (802.11/11a/11b) DCF: CSMA/CA with additional virtual carrier sensing (ad hoc) PCF: Point Coordination Control Function (infrastructure) Access Point Becomes a Scheduler Contention Free Mode DCF is more prevalent PCF and DCF can co-exist

IEEE 802.11 Medium Access Control Logic Wait for frame to transmit Medium idle? No Wait until current transmission ends IEEE 802.11 Medium Access Control Logic Yes Wait IFS Wait IFS Still idle? No Still idle? No Yes Yes Transmit frame Exponential backoff while medium idle Transmit frame

Inter Frame Spacing (IFS) Station has to detect a minimum idle time before transmit Time depends on type of Frame, type of MAC SIFS: Short IFS (used by ACKs, CTS) PIFS: PCF IFS used by PCF Frames DIFS: DCF IFS used by DCF Frames SIFS < PIFS < DIFS Relative values of IFS used to “prioritize” Medium Access

Basic Access Method DIFS Contention window PIFS DIFS Busy medium SIFS Backoff window Next frame Time Slot time Select slot using binary exponential backoff Defer access

802.11 CSMA/CA

Distributed Control Function (DCF) Network Allocation Vector: Prevents transmissions by other terminals. “Virtual” carrier sensing

Point Coordination Function (PCF) Alternative access method implemented on top of the DCF. Stations are scheduled to transmit by AP. Point coordinator (AP) uses PIFS when issuing polls. Optional MAC feature – not widely available in products.

802.11 Frame Structure 2 2 6 6 6 2 6 0-2312 4 Frame Duration Addr 1 Addr 2 Addr 3 Sequence Addr 4 Data CRC Control Control Total Header Size – 34 bytes Variable packet size Addr 1 to Addr 4: (Receiver/Transmitter Addresses; Source/Destination AP addresses) Frame Control: indicates if frame is data, RTS, CTS, or other type of control. Duration: indicates time in microseconds that the channel will be allocated for transmission (virtual carrier sensing) Sequence Control: identifies place in packet sequence for fragmentation and reassembly CRC: Cyclic Redundancy Check (for error detection) Source and Destination address are as in regular Ethernet packets Receiver address is AP’s BSSid when message is sent to the DS Transmitter address is AP’s BSSSid when message is sent from the DS Duration is specified in Microseconds

Power Management Most of the time mobile devices receive data in bursts and then become idle. To maintain session: AP buffers download data while mobile “sleeps” Mobiles are synchronized, and “wake up” at designated times. AP transmits beacon announcing mobiles with buffered data Mobile checks for buffered data; if listed, then goes active. AP transmits buffered data. Different from power control in cellular networks – geared towards burst data.