8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We’re making these slides freely available.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
Wireless Networking So we talked about wired networks. What about wireless?
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
6: Wireless and Mobile Networks6-1 Data Communication and Networks Lecture 5 Wireless Networks October 5, 2006.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Wednesday March 14, 2007 Acknowledgement:
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
OVERVIEW Lecture 2 Wireless Networks Lecture 2: Wireless Networks 1.
Wireless, Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background:  # wireless (mobile) phone subscribers now exceeds # wired phone subscribers!
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Wireless,
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Wireless,
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: §§6.1–6.3, Kurose and Ross 1.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
CS 372 – introduction to computer networks* Announcements: r Final exam on Friday  The materials after chapters 1,2  Emphasis on the material covered.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Advance Computer Networks Lecture#11 Instructor: Engr. Muhammad Mateen Yaqoob.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Lecture 4 Wireless Medium Access Control
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Chapter 6 Multiple Radio Access
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Final Exam Wednesday 3/18/2015 Tech LR PM 1.
IEEE WLAN.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
OVERVIEW Lecture 3 Wireless Networks (2). Lecture 3: Wireless Networks 2 CDMA: two-sender interference.
6: Wireless and Mobile Networks6-1 Chapter 6 outline 6.1 Introduction Wireless r 6.2 Wireless links, characteristics m CDMA r 6.3 IEEE wireless.
Universität Karlsruhe Institut für Telematik ECE 591
Lecture 27 University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CPE 400 / 600 Computer Communication Networks Prof. Shamik Sengupta.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Spring 2006 CPE :Wireless and Mobile Networks I 1 Special Topics in Computer Engineering Wireless and Mobile Networks: I Some of these Slides are.
CS 1652 Wireless and Mobile Networks Jack Lange University of Pittsburgh 1.
6: Wireless and Mobile Networks6-1 Chapter 6 outline 6.1 Introduction Wireless r 6.2 Wireless links, characteristics m CDMA r 6.3 IEEE wireless.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
6-1 Last time □ Ethernet ♦ frame structure ♦ CSMA/CD algorithm □ Hubs ♦ physical-layer repeaters ♦ make one large collision domain □ Switches ♦ link-layer.
Chapter 6 Wireless and Mobile Networks
Computer Communication Networks
CS 457 – Lecture 7 Wireless Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
Elements of a wireless network
EEC-484/584 Computer Networks
Chapter 6 Wireless and Mobile Networks
EEC-484/584 Computer Networks
Elements of a wireless network
Wireless LANs CS 352, Lecture 16
Chapter 6 Multiple Radio Access.
Elements of a wireless network
Presentation transcript:

8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles of Wireless Networks K. Pahlavan and P. Krishnamurth

8/7/20152 Outline CSMA/CA BTMA DSMA

8/7/20153 IEEE Wireless LAN b GHz unlicensed radio spectrum up to 11 Mbps direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code widely deployed, using base stations a 5-6 GHz range up to 54 Mbps g GHz range up to 54 Mbps All use CSMA/CA for multiple access All have base-station and ad- hoc network versions

8/7/ LAN architecture wireless host communicates with base station base station = access point (AP) Basic Service Set (BSS) (aka “ cell ” ) in infrastructure mode contains: wireless hosts access point (AP): base station ad hoc mode: hosts only BSS 1 BSS 2 Internet hub, switch or router AP

8/7/ : Channels, association b: 2.4GHz-2.485GHz spectrum divided into 11 channels at different frequencies AP admin chooses frequency for AP interference possible: channel can be same as that chosen by neighboring AP! host: must associate with an AP scans channels, listening for beacon frames containing AP ’ s name (SSID) and MAC address selects AP to associate with may perform authentication will typically run DHCP to get IP address in AP ’ s subnet

8/7/20156 Listen Before Talk (LBT) MT1 senses the channel first and then sends a packet During the second transmission of MT1, MT2 senses the channel and discovers that another terminal is using the medium MT2 delays the transmission using a pack-off algorithm CSMA reduces packet collision probability significantly compared with ALOHA The longer the propagation time, the less the efficient the CSMA IEEE MAC Protocol CSMA/CA

8/7/20157 CSMA..

8/7/20158 CSMA.. Several variations of CSMA have been employed in LANs, however, ALOHA is still preferred in WANs CSMA a) Persistent b) Non-Persistent After sensing the busy channel: a)The MT continues sensing the channel until the channel becomes free b)The MT attempts to another sensing after a random wait period

8/7/20159 CSMA.. a) 1-Persistent b) P-Persistent After the channel becomes free: a)The MT transmits its packet immediately b)The MT runs a random number generator and based on the outcome, transmits its packet with probability p Persistent

8/7/ CSMA..

8/7/ CSMA.. Hidden Terminal Problem: Two terminal within the range of intended third node, but out of range of each other Busy Tone Multiple Access (BTMA) (for Ad hoc) BW is divided into two channels, message channel and busy channel Whenever an MT sends signal on the message channel, it transmits a simple busy tone signal on its busy tone channel When any MT senses the busy tone signal, it runs on its own busy tone channel An MT with packet ready to send, first senses the busy tone channel to determine if the network is occupied

8/7/ /7/ It is possible that a node senses the channel idle, but should not transmit (the hidden terminal problem) Also, It is possible that a node senses the channel busy, but should transmit (In the examples, only nodes connected by a straight line can listen to each other ’ s transmissions) Carrier Sense Multiple Access (CSMA)

8/7/ /7/ Busy Tone Multiple Access (BTMA) Receiver transmits a busy tone in another channel (control channel) Nodes sense the control channel before transmitting

8/7/ /7/ Disadvantages of BTMA Some bandwidth is sacrificed, and nodes must be full-duplex (harder than half-duplex) If all receivers transmit BT, some transmitters are unnecessarily stopped If only intended receiver transmits BT, there are collisions elsewhere In first case, B can not transmit a packet to A (he should have been allowed) In second case, B transmits a packet to C and there is collision (bandwidth is wasted)

8/7/ CSMA.. Most cellular mobile data use different frequencies for downlink and uplink The BS is not hidden from MTs, whereas MTs may be hidden from on another In this situation, one may use the downlink channel to announce the availability of the MT This concept is used in a protocol referred to as digital or data sense multiple access (DSMA)

8/7/ CSMA.. DSMA Widely used in mobile networks The downlink broadcasts a periodic busy-idle bit announcing availability of downlink channel for data transmission of its packet An MT checks the busy-idle bit prior to transmission of its packet As soon as the MT starts the transmission of its packet, BS changes the busy-idle bit to the busy- state to prevent other MTs from transmission

8/7/ CSMA/CA avoid collisions: 2 + nodes transmitting at same time : CSMA - sense before transmitting don ’ t collide with ongoing transmission by other node : no collision detection! difficult to receive (sense collisions) when transmitting due to weak received signals (fading) can ’ t sense all collisions in any case: hidden terminal, fading goal: avoid collisions: CSMA/C(ollision)A(voidance) A B C A B C A’s signal strength space C’s signal strength

8/7/ /7/ Carrier Sense Multiple Access Collision Avoidance (CSMA/CA)

8/7/ CSMA/CA sender 1 if sense channel idle for DIFS then transmit entire frame (no CD) 2 if sense channel busy then start random backoff time timer counts down while channel idle transmit when timer expires if no ACK, increase random backoff interval, repeat receiver - if frame received OK return ACK after SIFS (ACK needed due to hidden terminal problem) sender receiver DIFS data SIFS ACK

8/7/ CSMA/CA..

8/7/ CSMA/CA.. IEEE b has four types of Inter Frame Space (IFS): Short IFS (SIFS): is the period between the completion of packet transmission and the start of the ACK frame. (The minimum IFS) Point Coordination IFS (PIFS): is SIFS plus a Slot Time, which is optional and we do not use it in our study Distributed IFS (DIFS): is PIFS plus a Slot Time Extended IFS (EIFS): is a longer IFS used by a station that has received a packet that it could not understand. This is needed to prevent collisions

8/7/ RTS/CTS idea: allow sender to “ reserve ” channel rather than random access of data frames: avoid collisions of long data frames sender first transmits small request-to-send (RTS) packets to BS using CSMA RTSs may still collide with each other (but they ’ re short) BS broadcasts clear-to-send CTS in response to RTS RTS heard by all nodes sender transmits data frame other stations defer transmissions

8/7/ Collision Avoidance: RTS-CTS exchange AP A B time RTS(A) RTS(B) RTS(A) CTS(A) DATA (A) ACK(A) reservation collision defer

8/7/ Performance Analysis

8/7/ Performance Analysis..