1 Introduction to Wireless Networks Michalis Faloutsos.

Slides:



Advertisements
Similar presentations
Networks: Wireless LANs1 Wireless Local Area Networks.
Advertisements

Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Chapter 6 High-Speed LANs1 Chapter 6 High-Speed LANs.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We’re making these slides freely available.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
Network Technology CSE Network Technology CSE3020 Week 9.
Slow Start Backoff Algorithm for Wireless Ad Hoc Networks Der-Jiunn Deng Department of Computer Science and Information Engineering National Changhua University.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
Wireless Networking So we talked about wired networks. What about wireless?
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Wireless Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering PSTN.
Networks: Wireless LANs1 Wireless Local Area Networks.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
1 Introduction to Wireless Networks Michalis Faloutsos.
1 Challenging the Modeling Assumptions of Mobile Networks Seminar 266 Michalis Faloutsos.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Wireless,
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 23 - CSMA/CA, Ad Hoc and Sensor Networks.
Wireless LAN Simulation - IEEE MAC Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Computer Networking Bridges/Switches, , PPP.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Chapter 5: The Data Link Layer
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Fundamentals of Computer Networks ECE 478/578
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Universität Karlsruhe Institut für Telematik ECE 591
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
Spring 2006 CPE :Wireless and Mobile Networks I 1 Special Topics in Computer Engineering Wireless and Mobile Networks: I Some of these Slides are.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Computer Communication Networks
CS 457 – Lecture 7 Wireless Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
EEC-484/584 Computer Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks
basics Richard Dunn CSE July 2, 2003.
Introduction to Wireless Networks
Wireless LAN Simulation IEEE MAC Protocol
EEC-484/584 Computer Networks
ECSE-4730: Computer Communication Networks (CCN)
Wireless LANs CS 352, Lecture 16
Presentation transcript:

1 Introduction to Wireless Networks Michalis Faloutsos

2 IEEE Wireless LAN - 1 Wireless LANs: untethered (often mobile) networking IEEE standard: MAC protocol unlicensed frequency spectrum: 900Mhz, 2.4Ghz

3 Basic Service Set (BSS) (a.k.a. “cell”) contains: wireless hosts access point (AP): base station BSS’s combined to form distribution system (DS) IEEE Wireless LAN - 2

4 IEEE used for Ad Hoc Networks Ad hoc network: IEEE stations can dynamically form network without AP Applications: “laptop” meeting in conference room, car interconnection of “personal” devices battlefield IETF MANET (Mobile Ad hoc Networks) working group

5 IEEE : Ways of operation CSMA CSMA/CA CA = Collision avoidance CA means: RTS CTS messages before sending data polling from Access Point Master-slave style of operation

6 IEEE MAC Protocol: CSMA CSMA sender: - if channel idle for DIFS sec. then transmit entire frame (no collision detection) -if sense channel busy then binary backoff CSMA receiver: if received OK return ACK after SIFS time

7 IEEE MAC Protocol: CSMA CSMA Protocol: others NAV: Network Allocation Vector frame has transmission time field others (hearing data) defer access for NAV time units

8 IEEE MAC Protocol with Collision Avoidance - 1 CSMA/CA: explicit channel reservation sender: send short RTS: request to send receiver: reply with short CTS: clear to send CTS reserves channel for sender, notifying (possibly hidden) stations Avoid hidden station collisions

9 IEEE MAC Protocol with Collision Avoidance - 2 RTS and CTS short: collisions less likely, of shorter duration end result “similar” to collision detection

10 Ad Hoc Networks

11 What is an ad hoc network A collection of nodes that can communicate with each other without the use of existing infrastructure Each node is a sender, a receiver, and a relay There are no “special nodes” (in principal) No specialized routers, no DNS servers Nodes can be static or mobile Can be thought of us: peer-to-peer communication

12 Example: Ad hoc network Nodes have power range Communication happens between nodes within range

13 What Is Different Here? Broadcasts of nodes can “overlap” -> collision How do we handle this? A MAC layer protocol could be the answer If one node broadcasts, neighbors keeps quite Thus, nearby nodes compete for air time This is called contention

14 Contention in ad hoc networks A major difference with wireline networks Air-time is the critical resource Fact 1: connections that cross vertically interfere Fact 2: connections that do not share nodes interfere Fact 3: a single connection interferes with itself!

15 Example of contention Yellow connection bothers pink connection Yellow bothers itself When A-E is active E-F is silent F-G is silent (is it?) A B C D E G F H

16 The Hidden Terminal Effect hidden terminals: A, C cannot hear each other obstacles, signal attenuation collisions at B goal: avoid collisions at B CSMA/CA: CSMA with Collision Avoidance

17 The MAC protocol with CA Introduced to reduce collisions Sender sends Request To Send (RTS): ask permission Case A: Receiver gives permission Clear To Send (CTS) Sender sends Data Receiver sends ACK, if received correctly Case B: Receiver does not respond Sender waits, times out, exponential back-off, and tries again A D C B RTS CTS RTS CTS

18 Why is this necessary? A: RTS, and B replies with a CTS C hears RTS and avoids sending anything C could have been near B (not shown here) D hears CTS so it does not send anything to B A D C B RTS CTS

19 Some numbers for Typical radius of power-range: 250m Interference range: 500m At 500m one can not hear, but they are bothered! RTS packet 40 bytes CTS and ACK 39 bytes MAC header is 47 bytes

20 Typical Simulation Environment A 2-dimensional rectangle Fixed number of nodes Static: uniformly distributed Dynamic: way-point model Pick location, move with speed v, pause Power range: fixed or variable Sender-receivers uniformly distributed

21 Slides not used

22 Various Communication Paradigms Broadcasting: one nodes reaches everybody Multicasting: One node reaches some nodes Anycasting: One node reaches a subset of some target nodes (one) Application Layer protocols and overlays Applications like peer-to-peer