5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.

Slides:



Advertisements
Similar presentations
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Advertisements

Module C- Part 1 WLAN Performance Aspects
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We’re making these slides freely available.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
Chapter 6 outline 6.1 Introduction Wireless
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
6: Wireless and Mobile Networks6-1 Data Communication and Networks Lecture 5 Wireless Networks October 5, 2006.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Wednesday March 14, 2007 Acknowledgement:
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
OVERVIEW Lecture 2 Wireless Networks Lecture 2: Wireless Networks 1.
Wireless, Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background:  # wireless (mobile) phone subscribers now exceeds # wired phone subscribers!
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Wireless,
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Wireless,
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: §§6.1–6.3, Kurose and Ross 1.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
CS 372 – introduction to computer networks* Announcements: r Final exam on Friday  The materials after chapters 1,2  Emphasis on the material covered.
Wireless, Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background:  # wireless (mobile) phone subscribers now exceeds # wired phone subscribers!
Advance Computer Networks Lecture#11 Instructor: Engr. Muhammad Mateen Yaqoob.
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Wireless LAN Simulation - IEEE MAC Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture 4 Wireless Medium Access Control
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Wireless,
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
1 CSCD 433 Network Programming Fall 2013 Lecture 7 Ethernet and Wireless
Final Exam Wednesday 3/18/2015 Tech LR PM 1.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
6: Wireless and Mobile Networks6-1 Chapter 6 outline 6.1 Introduction Wireless r 6.2 Wireless links, characteristics m CDMA r 6.3 IEEE wireless.
Universität Karlsruhe Institut für Telematik ECE 591
Lecture 27 University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CPE 400 / 600 Computer Communication Networks Prof. Shamik Sengupta.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Spring 2006 CPE :Wireless and Mobile Networks I 1 Special Topics in Computer Engineering Wireless and Mobile Networks: I Some of these Slides are.
CS 1652 Wireless and Mobile Networks Jack Lange University of Pittsburgh 1.
6: Wireless and Mobile Networks6-1 Chapter 6 outline 6.1 Introduction Wireless r 6.2 Wireless links, characteristics m CDMA r 6.3 IEEE wireless.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Introduction to Wireless Networking Dimitrios Koutsonikolas 01/27/2016 These slides contain material developed by Lili Qiu for CS386W at UT Austin and.
6-1 Last time □ Ethernet ♦ frame structure ♦ CSMA/CD algorithm □ Hubs ♦ physical-layer repeaters ♦ make one large collision domain □ Switches ♦ link-layer.
Computer Communication Networks
CS 457 – Lecture 7 Wireless Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
Elements of a wireless network
EEC-484/584 Computer Networks
Wireless LAN Simulation IEEE MAC Protocol
EEC-484/584 Computer Networks
Elements of a wireless network
Wireless LANs CS 352, Lecture 16
Elements of a wireless network
Presentation transcript:

5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS

5-2 Example 1 r Consider an CSMA/CA WLAN with two stations A and C and one Access Point (AP), B. At time, t=0, station A has generated a frame of length 10 slots and station C has generated a frame of length 5 slots both to be transmitted to B. What is the earliest time (T) that both the frames will be successfully received and acknowledged by B? r Assumptions: m DIFS = 2 slots m SIFS = 1 slot m ACK frames = 1 slot r T = ?

5-3 Example 2 r Consider an CSMA/CA WLAN with two stations A and C and one Access Point (AP), B. At time, t=0, station A has generated a frame of length 10 slots and station C has generated a frame of length 5 slots both to be transmitted to B. Assume that after waiting for DIFS, both A and C generated a random backoff number equal to 1. What is the earliest time (T) that both the frames will be successfully received and acknowledged by B? r Assumptions: m DIFS = 2 slots m SIFS = 1 slot m ACK frames = 1 slot r T = ?

5-4 Example 3 r Consider an CSMA/CA WLAN with two stations A and C and one Access Point (AP), B. At time, t=0, station A has generated a frame of length 20 slots and station C has generated a frame of length 10 slots both to be transmitted to B. Assume that after waiting for DIFS, both A and C generated a random backoff number equal to 1. What is the earliest time (T) that both the frames will be successfully received and acknowledged by B? r Assumptions: m DIFS = 2 slots m SIFS = 1 slot m ACK frames = 1 slot r T = ?

6-5 Avoiding collisions – RTS/CTS idea: allow sender to “reserve” channel rather than random access of data frames: avoid collisions of long data frames r sender first transmits small request-to-send (RTS) packets to BS using CSMA m RTSs may still collide with each other (but they’re short) r BS broadcasts clear-to-send CTS in response to RTS r CTS heard by all nodes m sender transmits data frame m other stations defer transmissions avoid data frame collisions completely using small reservation packets!

6-6 Collision Avoidance: RTS-CTS exchange AP A C time RTS(A) RTS(C) RTS(A) CTS(A) DATA (A) ACK(A) reservation collision defer

5-7 Example 4 r Consider an CSMA/CA WLAN with two stations A and C and one Access Point (AP), B. At time, t=0, station A has generated a frame of length 20 slots and station C has generated a frame of length 10 slots both to be transmitted to B. Assume that after waiting for DIFS, both A and C generated a random backoff number equal to 1. What is the earliest time (T) that both the frames will be successfully received and acknowledged by B? r Assumptions: m A and C are both RTS/CTS enabled m RTS = CTS = 1 slot m DIFS = 2 slots m SIFS = 1 slot m ACK frames = 1 slot r T = ?

6-8 Wireless network characteristics Multiple wireless senders and receivers create additional problems (beyond multiple access): A B C Hidden terminal problem r B, A hear each other r B, C hear each other r A, C can not hear each other means A, C unaware of their interference at B A B C A’s signal strength space C’s signal strength Signal attenuation: r B, A hear each other r B, C hear each other r A, C can not hear each other interfering at B