Mid Term Review. Mid Term Wed, April 8 –Open book –Open papers –Open slides In class exam –Duration 1 hour Exam level –Not hard.

Slides:



Advertisements
Similar presentations
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Ethernet – CSMA/CD Review
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
EETS 8316 : WIRELESS NETWORKS Vamsi Krishna Medharametla
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Doc.: IEEE /1539r0 Submission Dec Minho Cheong, ETRISlide 1 Beam forming for 11ah Date: Authors:
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
1 DOA-ALOHA: Slotted ALOHA for Ad Hoc Networking Using Smart Antennas Harkirat Singh & Suresh Singh Portland State University, OR, USA.
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
A New Approach for Accurate Modelling of Medium Access Control (MAC) Protocols Presenter: Moshe Zukerman ARC Centre for Ultra Broadband Information Networks.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
Doc.: IEEE /0861r0 SubmissionSayantan Choudhury Impact of CCA adaptation on spatial reuse in dense residential scenario Date: Authors:
Doc.: IEEE /1420r1Nov 2014 Submission Po-Kai Huang (Intel) Slide 1 The Impact of Preamble Error on MAC System Performance Date: NameAffiliationsAddressPhone .
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Link Layer: Wireless Mesh Networks Capacity Y. Richard Yang 11/13/2012.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
IEEE b Wireless LANs Ruiting Zhou Department of Computer Science University of Calgary Slides are from CPSC 641 by Prof. Carey Williamson.
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
1 Chapter 8 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3.
Mid Term Review. Mid Term Tue, April 1 –Open Book –Open papers –Open laptop In class exam –Duration 1hour 15 minutes Exam level –Not too easy, not too.
1 MAC Protocols that use Directional Antennnas. 2 Directional Antenna  Directional communication  Less Energy in the wrong direction Better Spatial.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi- Channel Hidden Terminals Using a Single Transceiver (MMAC) Paper by Jungmin So and Nitin Vaidya.
End-to-End Performance and Fairness in Multihop Wireless Backhaul Networks V. Gambiroza, B. Sadeghi, and E. Knightly Rice University.
Dynamic Data Rate and Transmit Power Adjustment in IEEE Wireless LANs Pierre Chevillat, Jens Jelitto, and Hong Linh Truong IBM Zurich Research Laboratory.
IEEE WLAN.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Recitation 8 Wireless Networks.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
THROUGHPUT ANALYSIS OF IEEE DCF BASIC IN PRESENCE OF HIDDEN STATIONS Shahriar Rahman Stanford Electrical Engineering
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Wireless Sensor Networks M Homework #2. IEEE MAC Protocol - Star topology – Part I Consider a square area equipped with 30 nodes distributed.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
doc.: IEEE /183r0 Submission March 2002 David Beberman, Corporate Wave Net, Inc.Slide 1 Single Burst Contention Resolution “Wireless Collision.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
Wireless Media Access Protocols Hari Balakrishnan LCS and EECS Massachusetts Institute of Technology
1 A Power Control MAC Protocol for Ad Hoc Networks EUN-SUN JUNG, NITIN H. VAIDYA, Wireless Networks 11, 55–66, Speaker: Han-Tien Chang.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Mid Term Review. Mid Term Wed, April 4 –Open Book –Open papers –Open laptop In class exam –Duration 1 hour 15 minutes Exam level –Not too easy, not too.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
Mid Term Review. Mid Term Wed, April 6 –Open book –Open papers –Open slides In class exam –Duration 1 hour Exam level –Not hard.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
MAC Protocols for Sensor Networks
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
MAC Protocols for Sensor Networks
Distributed Medium Access Control in Wireless Networks
Topics in Distributed Wireless Medium Access Control
IEEE : Wireless LANs ALOHA, Slotted ALOHA
On the Physical Carrier Sense in Wireless Ad-hoc Networks
WiFi Networks: IEEE b Wireless LANs
Some Mid-Term Thoughts
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
CSMA/CN: Carrier Sense Multiple Access with Collision Notification
WiFi Networks: IEEE b Wireless LANs
Chapter 6 Multiple Radio Access.
Presentation transcript:

Mid Term Review

Mid Term Wed, April 8 –Open book –Open papers –Open slides In class exam –Duration 1 hour Exam level –Not hard

–Wireless medium access control CSMA/CD and CSMA/CA Carrier Sensing Backing off WiFi Design Rate control, Directional antennas –Energy management –Localization Fingerprinting Logical localization War-driving and unsupervised Map matching Location privacy –Other topics till today (Energy, TagSense, Opo, Capacitive touch, free form gestures, driver, senSpeed) Syllabus

Approximate Exam Format Around 4 questions Q1. to Q2. -- Set of true/false statements –You will need to justify your answer in one sentence Q3 -- Topic question with sub-parts –You may need to work out small problems –You may need to argue and/or identify flaws –You may need to give examples/counter-examples Q4. -- Design Question –You may need to sketch the design a system

Approximate Exam Format Questions should NOT require you to know paper details –No need to know how many bytes is RTS/CTS, –Or what is the exact equation in RADAR, –Or how much accuracy does UnLoc achieve … Remember it’s an open papers, open book, open slides exam

Some Focus Topics Understand Basics (Undergrad review) –Transmission time, propagation delay, Q delay –CSMA/CD Vs CSMA/CA Understand well –Carrier sensing, Backoff, Hidden/Exposed terminals –RTS/CTS, ACK, NAV, Spatial Reuse –Directional antennas, rate control –Energy management (Beacons, PSM, SleepWell) Localization –Fingerprinting –Unsupervised nature –Sensor data clustering –Notions of privacy, K-anonymity

Some Example Questions

(T/F): When using , let X be the max throughput a user gets by transmitting to an AP. With increasing number of contenders, the aggregate throughput will first increase and then decrease, relative to X. –(assume that all users transmit identical traffic and transmit at a specified data rate). (T/F): Total time to transmit a packet is the sum of the time for the bits to leave the transmit antenna + propaation delay + time to receive all the bits at the receive antenna (T/F): Two links can be active in parallel because they are just adequately away from each other. If one of the links reduces its transmit rate, the links will have to operate in series. (T/F): A transmitter need not carrier sense when it is backing off

Some say that IEEE solves hidden terminal problems (HTP) by introducing the RTS/CTS mechanism. –1. List at least 2 counter-arguments. Use figures if necessary. –2. Assume that in Jupiter, signal power degrades linearly with distance (as opposed to exponentially with factor α). Will that be better or worse for the spatial reuse of the wireless network? Discuss in 2 or 3 sentences.

(T/F): Finding out logical locations from physical locations is difficult due to the absence of such lookup databases RADAR is deemed to violate privacy of users because APs can continuously learn where the users are. Does UnLoc violate privacy as well? If so, why? If not, why not? If so, is it possible to make UnLoc privacy preserving? SleepWell delays some beacons, implying that some clients will get their packets later than if SleepWell was not used. Does this degrade the latency observed by SleepWell? Can SleepWell improve the latency of transmission? Why?

Some Non-Examples What is the size of RTS/CTS packets? What is the WiFi fingerpriting equation in SurroundSense? What is the interference function in the paper on “partially overlapping channels …” These type of questions will not be asked

Any Questions? …

Please TA your class ppt slides if you have not done so already