HY539: Mobile Computing and Wireless Networks

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Medium Access Issues David Holmer
Networks: Wireless LANs1 Wireless Local Area Networks.
Contents IEEE MAC layer operation Basic CSMA/CA operation
Multiple access What if multiple machines are sharing the same link?
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Network Technology CSE Network Technology CSE3020 Week 9.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
Wireless Networking So we talked about wired networks. What about wireless?
Networks: Wireless LANs1 Wireless Local Area Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Wireless Local Area Networks
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Networks: Wireless LANs1 Wireless Local Area Networks.
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
WLAN b a Johan Montelius
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Medium Access Control Sublayer
1 Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Monday March 12, 2007 Acknowledgement:
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
ECE 4450:427/527 - Computer Networks Spring 2015
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
: Data Communication and Computer Networks
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Introduction to Wireless Networking Dimitrios Koutsonikolas 01/27/2016 These slides contain material developed by Lili Qiu for CS386W at UT Austin and.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
Medium Access Control MAC protocols: design goals, challenges,
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
CS 457 – Lecture 7 Wireless Networks
Chapter 6 Multiple Radio Access.
Presentation transcript:

HY539: Mobile Computing and Wireless Networks Lecture 4: Radio Transmission

Roadmap Physical layer overview Problems in wireless transmissions Access methods 802.11 physical layer (Chapter 10)

Shannon’s limit For a channel without shadowing, fading, or ISI, the maximum possible data rate on a given channel of bandwidth B is R=Blog2(1+SNR) bps, where SNR is the received signal to noise ratio

Bits mapped to signal (analog signal waveform) Adds redundancy to protect the digital information from noise and interference Bits mapped to signal (analog signal waveform) e.g., GFSK e.g., TDMA, CDMA The information is represented as a sequence of binary bits, the binary bits are then mapped (modulated) to analog signal waveforms and transmited over a communication channel. The communication channel introduces noise and interference to corrupt the transmitted signal. At the receiver, the channel corrupted transmitted signal is mapped back to binary bits. The received binary information is estimate of the transmitted binary information. Channel coding is often used in digital communication systems to protect the digital information from noise and interference and reduce the number of bit errors. Channel coding is mostly accomplished by selectively introducing redundant bits into the transmitted information stream. These additional bits will allow detection and correction of bit errors in the received data stream and provide more reliable information transmission.

Multipath Propagation Wall Scattering Receiver Transmitter Cabinet Diffraction (Shadow Fading) Reflection Wall

Mobile radio channel A single direct path between the base station and the mobile is seldom the only physical means for propagation Hence, the free space propagation model is inaccurate when used alone Two-ray ground reflection model considers both the direct path and a ground reflected propagation path between transmitter and receiver Reasonably accurate for predicting the large-scale signal strength over distances of several km for mobile radio systems that use tall tower (heights which exceed 40m) or for line-of-sight micro-cell channels in urban environment

Hidden node problem Node 3 Node 1 Node 2 From the perspective of node 1, node 3 is hidden If node 1 and node 3 communicate simultaneously, node 2 will be unable to make sense of anything Node 1 and node 3 would not have any indication of the error because the collision was local to node2

Fading problem Node 3 Node 1 Node 2 Node 1 and 3 are placed such that their signal is not strong enough for them to detect each other’s transmissions, and yet their transmissions are strong enough to have interfered with each other at node 2

Carrier-Sensing Functions Physical carrier-sensing Expensive to build hardware for RF-based media Transceivers can transmit and receive simultaneously only if they incorporate expensive electronics Hidden nodes problem Fading problem Virtual carrier-sensing Collision avoidance: stations delay transmission until the medium becomes idle Reduce the probability of collisions Undetectable collisions

Carrier-Sensing Functions Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) Virtual sensing MAC layer control messages (RTS, CTS, ACK) network allocation vector (NAV) to ensure that atomic operations are not interrupted Different types of delay depending on the priority of the frame (e.g., SIFS, DIFS, backoff)

Question: [answers @ log] Transceivers that transmit and receive simultaneously

Modulation techniques Code Division Multiple Access (CDMA) , Direct Sequence Spread Spectrum (DSSS) Frequency Hopping (FH), Orthogonal Frequency Division Multiplexing (OFDM)

IEEE 802.11 family 802.11b: Direct Sequence Spread Spectrum (DSSS) or Frequency Hopping (FH), operates at 2.4GHz, 11Mbps bitrate 802.11a: between 5GHz and 6GHz uses orthogonal frequency-division multiplexing, up to 54Mbps bitrate 802.11g: operates at 2.4GHz up to 54Mbps bitrate All have the same architecture & use the same MAC protocol

Code Division Multiple Access (CDMA) CDMA assigns a different code to each node Codes orthogonal to each other (i.e inner-product = 0) Each node uses its unique code to encode the data bits it sends Nodes can transmit simultaneously Multiple nodes per channel Their respective receivers correctly receive a sender’s encoded data bits assuming the receiver knows the sender’s code in spite of interfering transmissions by other nodes. Has been used extensively in military for some time due to its antijamming properties and is now beginning to find widespread civilian use, particularly for use in wireless multiple access channels.

CDMA Example Sender Zi,m=di*cm Data bits d0=1 d1=-1 Spread code 1 1 1 Time slot 1 Time slot 0 1 1 1 1 1 1 1 1 Channel output -1 -1 -1 -1 -1 -1 -1 -1

CDMA Example When no interfering senders, the receiver would receive the encoded bits and recover the original data bit, di, by computing di= — S Zi,m*cm Interfering transmitted bit signals are additive M 1 M m=1 CDMA’s assumption that interfering transmitted bit signals are additive

Frequency Hopping Timing the hops accurately is the challenge slot 5 User A 4 User B 3 2 1 Time slot

Modulation techniques DSSS As CDMA except all mobile hosts and base stations use the same chipping code Spreads the energy in a signal over a wider frequency range Spreading ratio (i.e., number of chips) should be as low as possible to meet design requirements and avoid wasting bandwidth FH divides the ISM band into a series of 1-MHz channels Divides hopping sequences into non-overlapping sets Any two members of a set are orthogonal hopping sequences OFDM Distributes the data over a large number of carriers that are spaced apart at precise frequencies. This spacing provides the "orthogonality" in this technique which prevents the demodulators from seeing frequencies other than their own. The benefits of OFDM are high spectral efficiency, resiliency to RF interference, and lower multi-path distortion.

802.11 direct-sequence Uses the Barker sequence (11-bit sequence) It is applied to each bit in the stream by a modulo-2 adder: when 1 is encoded, all the bits in the spreading code change; when 0 is encoded, they stay the same FCC imposes legal limits on the power transmission: One watt of transmitter output power and four watss of effective radiated poewr. Effective radiated power is transmitters power output * gain of the antenna-loss in the transmission line.

802.11 Media Access Protocol Coordinates the access & use of the shared radio frequency Carrier Sense Multiple Access protocol with collision avoidance (CSMA/CA) Physical layer monitors the energy level on the radio frequency to determine whether another station is transmitting and provides this carrier-sensing information to the MAC protocol If channel is sensed idle for DIFS, a station can transmit When receiving station has correctly & completely received a frame for which it was the addressed recipient, it waits a short period of time SIFS and then sends an ACK

Carrier-Sensing Functions IEEE 802.11 to avoid collisions Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) MAC layer RTS, CTS, ACK network allocation vector (NAV) to ensure that atomic operations are not interrupted Different types of delay Short Inter-frame space (SIFS): highest priority transmissions (RTS, CTS, ACK) DCF inter-frame space (DIFS): minimum idle time for contention-based services EIFS: minimum idle time in case of “erroneous” past transmission

RTS/CTS clearing Node 1 Node 2 Node3 Node 1 RTS Time CTS frame Node 2 (4) ACK CTS frame Node 2 ACK RTS: reserving the radio link for transmission RTS, CTS: Silence any station that hear them

Positive acknowledgement of data transmission Node 1 Node 2 Time frame ACK 802.11 allows stations to lock out contention during atomic operation so that atomic sequences are not interrupted by other Hosts attempting to use the transmission medium

802.11 Media Access Protocol If channel is sensed busy will defer its access until the channel is later sensed to be idle Once the channel is sensed to be idle for time DIFS, the station computes an additional random backoff time and counts down this time as the channel is sensed idle. When the random backoff timer reaches zero, the station transmits its frame Backoff process to avoid having multiple stations immediately begin transmission and thus collide

Using the NAV for virtual carrier sensing (eg 4-8KB) RTS Frame CTS ACK Sender Receiver NAV DIFS SIFS NAV (RTS) NAV(CTS) (e.g.10ms) Carrier-sensing functions Contention Window Access to medium deferred NAV is carried in the headers of CTS & RTS

Backoff with DCF Contention window (or backoff window) follows the DIFS Window is divided in time slots Slot length is medium-dependent Window length limited and medium-dependent Hosts pick a random slot and wait for that slot before attempting to access the medium; All slots are equally likely selections Host that picks the first slot (earlier number) wins Each time the retry counter increases, the contention window moves to the next greatest power of two

Contention window size DIFS Previous Frame 31 slots Initial Attempt 63 slots 127 slots 1st retransmission 2nd retransmission 3rd retransmission 255 slots Slot time:20s The contention window is reset to its minimum size when frames are transmitted successfully, or the associated retry counter is reached and the frame is discarded