1 Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Monday March 19, 2007 Acknowledgement:

Slides:



Advertisements
Similar presentations
6: Wireless and Mobile Networks6-1 Chapter outline Mobility r 6.5 Principles: addressing and routing to mobile users r 6.6 Mobile IP r 6.7 Handling.
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Monday March 19, 2007 Acknowledgement:
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
1 Ethernet EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement: Some slides taken.
Wireless, Mobile Networks – Mobility. Wireless, Mobile Networks6-2 Mobility: Vocabulary home network: permanent “home” of mobile (e.g., /24)
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Chapter 6 Wireless and Mobile Networks
6: Wireless and Mobile Networks6-1 EEE 459/591 Communication Networks Spring 2005 Prof. M. Reisslein Chapter 6 Wireless and Mobile Networks Textbook: Computer.
1 Wireless Networks ECS 152A Acknowledgement: slides from Kurose and Ross.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
20 - Mobility 6: Wireless and Mobile Networks.
Wireless and Mobile Networks1. 2 Background: r # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! r computer nets: laptops,
1 Chapter 6: Wireless and Mobile Networks Objectives  Introduction  Wireless links, characteristics  CDMA  IEEE wireless LANs (“wi-fi”)  Cellular.
ICMP: Internet Control Message Protocol used by hosts, routers, gateways to communication network-level information –error reporting: unreachable host,
1 Last class r Random Access Protocols m Slotted Aloha m Aloha m CSMA/CD m “Taking Turns” Protocols r Link-Layer Addressing Today r Ethernet, Hubs and.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
Gordon College Adapted from Computer Networking: A Top Down Approach
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
12-1 Last time □ BGP policy □ Broadcast / multicast routing ♦ Spanning trees Source-based, group-shared, center-based ♦ Reverse path forwarding, pruning.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
CHAPTER 6. Wireless, Mobile Networks6-2 Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired.
13-1 Last time □ Router internals ♦ Input ports, switching fabric, output ports ♦ Switching via memory, bus, crossbar ♦ Queueing, head-of-line blocking.
Lecture 4 Mobility Overview.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks.
6-1 Chapter 6 outline Introduction Wireless r Wireless links, characteristics r IEEE wireless LANs (“wi-fi”) Mobility r Principles: addressing and.
CS 372 – introduction to computer networks* Announcements: r Final exam on Friday  The materials after chapters 1,2  Emphasis on the material covered.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 5 outline 5.1 Introduction and services
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Mobile IP Overview and Discussion. 2 Spectrum of Mobility – from network perspective no mobility high mobility mobile user, using same access point mobile.
Wireless, Mobile Networks6-1 Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics  CDMA 6.3 IEEE wireless LANs (“Wi-Fi”)
Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! r computer nets: laptops,
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer
Lecture 8 Mobility CPE 401/601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross All material copyright J.F Kurose and.
CELLULAR DATA NETWORKS Mr. Husnain Sherazi Lecture 5.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Wireless,
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Location management. Mobile Switching Center Public telephone network, and Internet Mobile Switching Center Components of cellular network architecture.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Sharif University of Technology 6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Network Layer4-1 Today Collect homework New homework: Ch4 #16,19,21-24,26,27,29,31 (half graded, as usual) Due Wednesday Oct 15 in class Final programming.
OVERVIEW Lecture 3 Wireless Networks (2). Lecture 3: Wireless Networks 2 CDMA: two-sender interference.
6: Wireless and Mobile Networks6-1 Chapter 6 outline 6.1 Introduction Wireless r 6.2 Wireless links, characteristics m CDMA r 6.3 IEEE wireless.
6: Wireless and Mobile Networks 6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Accommodating mobility with direct routing
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Mobility CPE 401/601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross All material copyright J.F Kurose and K.W. Ross,
DMET 602: Networks and Media Lab Amr El Mougy Yasmeen EssamAlaa Tarek.
6: Wireless and Mobile Networks 6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
6: Wireless and Mobile Networks 6-1 Chapter 6 Mobile IP A note on the use of these ppt slides: We’re making these slides freely available to all (faculty,
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
Prof. Younghee Lee 1 1 Computer Networks u Lecture 11: Mobility Prof. Younghee Lee * Some part of this teaching materials are prepared referencing the.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks.
Link Layer 5.1 Introduction and services
Chapter 6 Wireless and Mobile Networks
CPE 401/601 Computer Network Systems
Presentation transcript:

1 Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Monday March 19, 2007 Acknowledgement: Some slides taken from Kurose&Ross

2 Mobile IP r RFC 3220 r has many features we’ve seen: m home agents, foreign agents, foreign-agent registration, care-of-addresses, encapsulation (packet-within-a-packet) r three components to standard: m indirect routing of datagrams m agent discovery m registration with home agent

3 Mobile IP: indirect routing Permanent address: Care-of address: dest: packet sent by correspondent dest: dest: packet sent by home agent to foreign agent: a packet within a packet dest: foreign-agent-to-mobile packet

4 Mobile IP: agent discovery r agent advertisement: foreign/home agents advertise service by broadcasting ICMP messages (typefield = 9) R bit: registration required H,F bits: home and/or foreign agent

5 Mobile IP: registration example

6 Components of cellular network architecture correspondent MSC wired public telephone network different cellular networks, operated by different providers recall:

7 Handling mobility in cellular networks r home network: network of cellular provider you subscribe to (e.g., Sprint PCS, Verizon) m home location register (HLR): database in home network containing permanent cell phone #, profile information (services, preferences, billing), information about current location (could be in another network) r visited network: network in which mobile currently resides m visitor location register (VLR): database with entry for each user currently in network m could be home network

8 Public switched telephone network mobile user home Mobile Switching Center HLR home network visited network correspondent Mobile Switching Center VLR GSM: indirect routing to mobile 1 call routed to home network 2 home MSC consults HLR, gets roaming number of mobile in visited network 3 home MSC sets up 2 nd leg of call to MSC in visited network 4 MSC in visited network completes call through base station to mobile

9 Mobile Switching Center VLR old BS new BS old routing new routing GSM: handoff with common MSC r Handoff goal: route call via new base station (without interruption) r reasons for handoff: m stronger signal to/from new BS (continuing connectivity, less battery drain) m load balance: free up channel in current BS m GSM doesn’t mandate why to perform handoff (policy), only how (mechanism) r handoff initiated by old BS

10 Mobile Switching Center VLR old BS GSM: handoff with common MSC new BS 1. old BS informs MSC of impending handoff, provides list of 1 + new BSs 2. MSC sets up path (allocates resources) to new BS 3. new BS allocates radio channel for use by mobile 4. new BS signals MSC, old BS: ready 5. old BS tells mobile: perform handoff to new BS 6. mobile, new BS signal to activate new channel 7. mobile signals via new BS to MSC: handoff complete. MSC reroutes call 8 MSC-old-BS resources released

11 home network Home MSC PSTN correspondent MSC anchor MSC MSC (a) before handoff GSM: handoff between MSCs r anchor MSC: first MSC visited during call m call remains routed through anchor MSC r new MSCs add on to end of MSC chain as mobile moves to new MSC r IS-41 allows optional path minimization step to shorten multi-MSC chain

12 home network Home MSC PSTN correspondent MSC anchor MSC MSC (b) after handoff GSM: handoff between MSCs r anchor MSC: first MSC visited during cal m call remains routed through anchor MSC r new MSCs add on to end of MSC chain as mobile moves to new MSC r IS-41 allows optional path minimization step to shorten multi-MSC chain

13 Mobility: GSM versus Mobile IP GSM elementComment on GSM elementMobile IP element Home systemNetwork to which the mobile user’s permanent phone number belongs Home network Gateway Mobile Switching Center, or “home MSC”. Home Location Register (HLR) Home MSC: point of contact to obtain routable address of mobile user. HLR: database in home system containing permanent phone number, profile information, current location of mobile user, subscription information Home agent Visited SystemNetwork other than home system where mobile user is currently residing Visited network Visited Mobile services Switching Center. Visitor Location Record (VLR) Visited MSC: responsible for setting up calls to/from mobile nodes in cells associated with MSC. VLR: temporary database entry in visited system, containing subscription information for each visiting mobile user Foreign agent Mobile Station Roaming Number (MSRN), or “roaming number” Routable address for telephone call segment between home MSC and visited MSC, visible to neither the mobile nor the correspondent. Care-of- address

14 Wireless, mobility: impact on higher layer protocols r logically, impact should be minimal … m best effort service model remains unchanged m TCP and UDP can (and do) run over wireless, mobile r … but performance-wise: m packet loss/delay due to bit-errors (discarded packets, delays for link-layer retransmissions), and handoff m TCP interprets loss as congestion, will decrease congestion window un-necessarily m delay impairments for real-time traffic m limited bandwidth of wireless links

15 Chapter 6 Summary Wireless r wireless links: m capacity, distance m channel impairments m CDMA r IEEE (“wi-fi”) m CSMA/CA reflects wireless channel characteristics r cellular access m architecture m standards (e.g., GSM, CDMA-2000, UMTS) Mobility r principles: addressing, routing to mobile users m home, visited networks m direct, indirect routing m care-of-addresses r case studies m mobile IP m mobility in GSM r impact on higher-layer protocols

16 MPLS is used today! r % traceroute -q1 -w2 r traceroute to ( ), 30 hops max, 46 byte packets r 1 eecscomp2-4 ( ) ms r ( ) ms r 3 ge-caen-bin-seb.r-bin-seb.umnet.umich.edu ( ) ms r 4 pc-bin-arb-seb.r-bin-arb.umnet.umich.edu ( ) ms r 5 ge-1-1-0x984.aa1.mich.net ( ) ms r ( ) ms r 7 brvwil1wcx2-pos14-1.wcg.net ( ) ms r ( ) ms r 9 te-4-4.car2.Chicago1.Level3.net ( ) ms r 10 ae car4.Chicago1.Level3.net ( ) ms r 11 ggr2-p3110.cgcil.ip.att.net ( ) ms r 12 tbr2-p cgcil.ip.att.net ( ) ms r MPLS Label=32719 CoS=0 TTL=0 S=1 r 13 tbr2-cl3641.phlpa.ip.att.net ( ) ms r MPLS Label=31344 CoS=0 TTL=0 S=1 r 14 tbr1-cl9.wswdc.ip.att.net ( ) ms r MPLS Label=31295 CoS=0 TTL=0 S=1 r 15 gbr5-p10.wswdc.ip.att.net ( ) ms r MPLS Label=317 CoS=0 TTL=0 S=1 r 16 gbr1-s83.mdtva.ip.att.net ( ) ms r ( ) ms r 18 * CoS: Class of Service S: Stacking bit

17 Boeing Connexion Mobility Service

18 Example problem 1 r If all the links in the Internet were to provide the reliable delivery service, would the TCP reliable delivery service be redundant? Why or why not?

19 Example problem 1 r If all the links in the Internet were to provide the reliable delivery service, would the TCP reliable delivery service be redundant? Why or why not? r Ans: TCP is still needed to ensure end-to- end reliability. Packets may be lost due to routing loops or equipment failures. TCP also provide in-order delivery.

20 Example problem 2 r Suppose two nodes start to transmit at the same time a packet of length L over a broadcast channel of rate R. Denote the propagation delay between the two nodes as t prop. Will there be collision if t prop < L/R? Why or why not?

21 Example problem 2 r Suppose two nodes start to transmit at the same time a packet of length L over a broadcast channel of rate R. Denote the propagation delay between the two nodes as t prop. Will there be collision if t prop < L/R? Why or why not? r Ans: Yes, there will be collision, because while a node is transmitting it will start to receive a packet from the other node.

22 Review: Ethernet CSMA/CD algorithm 1. Adaptor receives datagram from net layer & creates frame 2. If adapter senses channel idle (for 96 bit times), it starts to transmit frame. If it senses channel busy, waits until channel idle (for 96 bit times), and then transmits 3. If adapter transmits entire frame without detecting another transmission, the adapter is done with frame! 4. If adapter detects another transmission while transmitting, aborts and sends jam signal 5. After aborting, adapter enters exponential backoff: after the mth collision, adapter chooses a K at random from {0,1,2,…,2 m -1}. Adapter waits K·512 bit times and returns to Step 2

23 Review: Ethernet’s CSMA/CD (more) Jam Signal: make sure all other transmitters are aware of collision; 48 bits Bit time:.1 microsec for 10 Mbps Ethernet ; for K=1023, wait time is about 50 msec Exponential Backoff: r Goal: adapt retransmission attempts to estimated current load m heavy load: random wait will be longer r first collision: choose K from {0,1}; delay is K· 512 bit transmission times r after second collision: choose K from {0,1,2,3}… r after ten collisions, choose K from {0,1,2,3,4,…,1023}

24 Example problem 3 r In CSMA/CD, after the fifth collision, what is the probability that a node chooses K=4? The result K=4 corresponds to a delay of how many seconds on a 10 Mbps Ethernet?

25 Example problem 3 r In CSMA/CD, after the fifth collision, what is the probability that a node chooses K=4? The result K=4 corresponds to a delay of how many seconds on a 10 Mbps Ethernet? r Ans: After the fifth collision, the adapter chooses from {0,1,2,…., 2^5-1}. The probability that it chooses 4 is 1/32. r It waits K· 512 bit transmission times m 4x512bit/(10Mbps) = microseconds.

26 Example problem 4 r Suppose nodes A and B are on the same 10Mbps Ethernet segment and the propagation delay between the two nodes is 225 bit times. Suppose A and B send frames at the same time, the frames collide, and then A and B choose different values of K in the CSMA/CD algorithm. Assuming no other nodes are active, can the retransmissions from A and B collide?

27 r Suppose nodes A and B are on the same 10Mbps Ethernet segment and the propagation delay between the two nodes is 225 bit times. Suppose A and B send frames at the same time, the frames collide, and then A and B choose different values of K in the CSMA/CD algorithm. Assuming no other nodes are active, can the retransmissions from A and B collide? r Ans: Assuming A chooses K=0, B chooses K=1, basically we need to find out whether A’s retransmission will reach B before B’s scheduled retransmission time. (It’s unlikely that A can finish retransmission before B retransmits.)

28 r Suppose nodes A and B are on the same 10Mbps Ethernet segment and the propagation delay btw. the two nodes is 225 bit times. Suppose A and B send frames at the same time, the frames collide, and then A and B choose different values of K in the CSMA/CD algorithm. Assuming no other nodes are active, can the retransmissions from A and B collide? r Draw a time line: m t=0A and B begin transmission m t=225A and B detect collision m t=225+48=273A and B finish sending Jam signal m =498B’s last bit arrives at A; A detects an idle channel m =594A starts transmitting m =785B returns to step2, B must sense idle channel for 96 bit times: =881 m =819A’s transmission reaches B m 819<881: A’s retransmission reaches B before B can send.

29 Example problem 5 r Why are link layer acknowledgements used in but not in wired Ethernet?

30 Example problem 5 r Why are link layer acknowledgements used in but not in wired Ethernet? r Ans: Two reasons why uses ACKs: (1) wireless channel’s bit error rate is much higher. (2) in wired Ethernet, a transmitting station can detect when there has and hasn’t been a collision, but in a station cannot detect a collision due to hidden terminal problem.

31 Example problem 6 r Suppose the IEEE RTS and CTS frames were as long as the standard DATA frames. Would there be any advantage to using the CTS and RTS frames? Why and why not?

32 Example problem 6 r Suppose the IEEE RTS and CTS frames were as long as the standard DATA frames. Would there be any advantage to using the CTS and RTS frames? Why and why not? r Ans: No, there wouldn’t be any advantage. Suppose there are two stations that want to transmit at the same time, and they both use RTS/CTS. If the RTS frame is as long as a DATA frame, the channel would be wasted for as long as it would have been wasted for colliding DATA frames. Thus, the RTS/CTS exchange is only useful when they are significantly smaller than DATA frames.

33 Example problem 7 r Consider three LANs interconnected by two routers r Assign IPs to all the interfaces. Subnet 1 uses addresses of the form xxx, subnet 2 uses addresses of the form xxx, and subnet 3 uses addresses of the form xxx r Assign MAC addresses (arbitrarily). r Consider sending an IP datagram from Host A to Host F, suppose all the ARP tables are up-to-date. Enumerate all the steps. Subnet 1 A B Subnet 3 E F C D Subnet 2

34 Example problem 7 Subnet 1 A B Subnet 3 E F C D Subnet

Subnet 1 A B Subnet 3 E F C D Subnet Forwarding table in A determines that the datagram should be routed to interface Host A uses ARP to determine the LAN address for , namely The adapter in A creates an Ethernet packet with destination address of The first router receives the packet and extracts the datagram. The forwarding table in this router indicates that the datagram is to be routed to The first router then uses ARP to obtain the associated Ethernet address: The process continues until the packet has reached host F.