15-744: Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan.

Slides:



Advertisements
Similar presentations
Networks: Wireless LANs1 Wireless Local Area Networks.
Advertisements

Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Hui Zhang, Fall Computer Networking TCP Enhancements.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
15-441: Computer Networking Lecture 24: Mobile and Wireless Networking.
Network Technology CSE Network Technology CSE3020 Week 9.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
CS 268: Wireless Transport Protocols Kevin Lai Feb 13, 2002.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
15-441: Computer Networking Lecture 19: Wireless, Ad-Hoc Networks As usual: thanks to Dave and Srini.
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
15-441: Computer Networking Lecture 21: Wireless Networking.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
Reliable Transport Layers in Wireless Networks Mark Perillo Electrical and Computer Engineering.
1 A Comparison of Mechanisms for Improving TCP Performance over Wireless Links Course : CS898T Instructor : Dr.Chang - Swapna Sunkara.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
L-5 Wireless 1. 2 Wireless Challenges Force us to rethink many assumptions Need to share airwaves rather than wire  Don’t know what hosts are involved.
IEEE 802 Series LAN/MAN Bridging & Management Logical Link Control CSMA/CD (Ethernet) Token Bus Token Ring Wireless.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
15-744: Computer Networking L-9 Wireless. Wireless Intro TCP on wireless links Wireless MAC Assigned reading [BPSK97] A Comparison of Mechanism for Improving.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
15-744: Computer Networking L-19 Wireless. Wireless Intro TCP on wireless links Wireless MAC Assigned reading [BPSK97] A Comparison of Mechanism for Improving.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
CIS 725 Wireless networks. Low bandwidth High error rates.
Computer Networking Lecture 4 – and more.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
CWNA Guide to Wireless LANs, Second Edition
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 05. MAC and Physical Layers.
15-441: Computer Networking Lecture 23: Wireless Networking Copyright ©, Carnegie Mellon University.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
IEEE WLAN.
15-441: Computer Networking Lecture 23: Mobile and Wireless Networking.
CS 268: Computer Networking L-10 Wireless. Wireless Intro TCP on wireless links Wireless MAC Assigned reading [BPSK97] A Comparison of Mechanism for Improving.
Challenges to Reliable Data Transport Over Heterogeneous Wireless Networks.
15-744: Computer Networking L-18 Mobile Transport and Applications.
15-441: Computer Networking Lecture 24: Wireless Networking Copyright ©, Carnegie Mellon University.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
15-744: Computer Networking L-9 Wireless. Wireless Intro TCP on wireless links Wireless MAC Assigned reading [BPSK97] A Comparison of Mechanism for Improving.
WLAN.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
WLAN 1. IEEE Overview Adopted in 1997 Defines: MAC sublayer MAC management protocols and services Physical (PHY) layers – IR – FHSS – DSSS.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
15-744: Computer Networking L-20 Wireless. Wireless Intro TCP on wireless links Wireless MAC Assigned reading [BPSK97] A Comparison of Mechanism for Improving.
CS 268: Computer Networking
15-744: Computer Networking
Wireless LANs Wireless proliferating rapidly.
MACAW: A Media Access Protocol for Wireless LAN’s
CS 457 – Lecture 7 Wireless Networks
Presentation transcript:

15-744: Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained from other sources, a reference will be noted on the bottom of that slide.

Wireless Intro TCP on wireless links Wireless MAC Assigned reading [BPSK97] A Comparison of Mechanism for Improving TCP Performance over Wireless Links [BDS+94] MACAW: A Media Access Protocol for Wireless LAN’s 2

3 Wireless Challenges Force us to rethink many assumptions Need to share airwaves rather than wire Don’t know what hosts are involved Host may not be using same link technology Mobility Other characteristics of wireless Noisy  lots of losses Slow Interaction of multiple transmitters at receiver Collisions, capture, interference Multipath interference

4 Overview Wireless Background Wireless MAC MACAW Wireless TCP

Transmission Channel Considerations Every medium supports transmission in a certain frequency range. Outside this range, effects such as attenuation,.. degrade the signal too much Transmission and receive hardware will try to maximize the useful bandwidth in this frequency band. Tradeoffs between cost, distance, bit rate As technology improves, these parameters change, even for the same wire. Thanks to our EE friends 5 Frequency GoodBad Signal

The Nyquist Limit A noiseless channel of width H can at most transmit a binary signal at a rate 2 x H. E.g. a 3000 Hz channel can transmit data at a rate of at most 6000 bits/second Assumes binary amplitude encoding 6

Past the Nyquist Limit More aggressive encoding can increase the channel bandwidth. Example: modems Same frequency - number of symbols per second Symbols have more possible values 7 psk Psk + AM

Capacity of a Noisy Channel Can’t add infinite symbols - you have to be able to tell them apart. This is where noise comes in. Shannon’s theorem: C = B x log(1 + S/N) C: maximum capacity (bps) B: channel bandwidth (Hz) S/N: signal to noise ratio of the channel Often expressed in decibels (db). 10 log(S/N). Example: Local loop bandwidth: 3200 Hz Typical S/N: 1000 (30db) What is the upper limit on capacity? Modems: Teleco internally converts to 56kbit/s digital signal, which sets a limit on B and the S/N. 8

9 Free Space Loss Loss = P t / P r = (4  d) 2 / (G r G t 2 ) Loss increases quickly with distance (d 2 ). Need to consider the gain of the antennas at transmitter and receiver. Loss depends on frequency: higher loss with higher frequency. But careful: antenna gain depends on frequency too For fixed antenna area, loss decreases with frequency Can cause distortion of signal for wide-band signals

10 Cellular Reuse Transmissions decay over distance Spectrum can be reused in different areas Different “LANs” Decay is 1/R 2 in free space, 1/R 4 in some situations

Multipath Effects Receiver receives multiple copies of the signal, each following a different path Copies can either strengthen or weaken each other. Depends on whether they are in our out of phase Small changes in location can result in big changes in signal strength. Short wavelengths, e.g. 2.4 GHz  12 cm Difference in path length can cause inter-symbol interference (ISI). 11

12 Fading - Example Frequency of 910 MHz or wavelength of about 33 cm

13 Overview Wireless Background Wireless MAC MACAW Wireless TCP

Medium Access Control Think back to Ethernet MAC: Wireless is a shared medium Transmitters interfere Need a way to ensure that (usually) only one person talks at a time. Goals: Efficiency, possibly fairness 14

15 Example MAC Protocols Pure ALOHA Transmit whenever a message is ready Retransmit when ACK is not received Slotted ALOHA Time is divided into equal time slots Transmit only at the beginning of a time slot Avoid partial collisions Increase delay, and require synchronization Carrier Sense Multiple Access (CSMA) Listen before transmit Transmit only when no carrier is detected

16 CSMA/CD Does Not Work Carrier sense problems Relevant contention at the receiver, not sender Hidden terminal Exposed terminal Collision detection problems Hard to build a radio that can transmit and receive at same time A B C A B C D HiddenExposed

4 design details 1.Contention is at the receiver 2.Congestion is location dependent 3.Fairness through learning of congestion levels 4.Propagate synchronization information about contention periods MACAW 17

Fairness in MACAW Channel capture in MACA Backoff doubled every collision Reduce backoff on success Solution: Copy backoffs This does not always work as wanted 18

MACAW: Additional Design Multiple Stream Model ACK (TCP transfer!) 19

MACAW: Additional Design DS Because carrier sense disabled RTS CTS Doesn’t hear CTS Hears RTS DS Hears DS DATA 20

RTSDSDATA RTS RRTS Problem: CTS RTS Cannot send CTS Backoff Increases ACK RRTS RRTS prevents P2 from responding RTS CTS DS DATA RTS RTS lost X 21

MACAW: Conclusions 8% extra overhead for DS and ACK 37% improvement in congestion Future work: Multicast support Copying backoff 22

23 Overview Wireless Background Wireless MAC MACAW Wireless TCP

24 IEEE Overview Adopted in 1997 Defines: MAC sublayer MAC management protocols and services Physical (PHY) layers IR FHSS DSSS

particulars b (WiFi) Frequency: Ghz DSSS Modulation: DBPSK (1Mbps) / DQPSK (faster) Orthogonal channels: 3 There are others, but they interfere. (!) Rates: 1, 2, 5.5, 11 Mbps a: Faster, 5Ghz OFDM. Up to 54Mbps g: Faster, 2.4Ghz, up to 54Mbps

26 Overview, Architecture STA AP ESS BSS Existing Wired LAN Infrastructure Network Ad Hoc Network BSS: Basic Service Set ESS: Extended Service Set

modes Infrastructure mode All packets go through a base station Cards associate with a BSS (basic service set) Multiple BSSs can be linked into an Extended Service Set (ESS) Handoff to new BSS in ESS is pretty quick Wandering around CMU Moving to new ESS is slower, may require re- addressing Wandering from CMU to Pitt Ad Hoc mode Cards communicate directly. Perform some, but not all, of the AP functions

Management Operations Scanning Association/Reassociation Time synchronization Power management

29 Scanning & Joining Goal: find networks in the area Passive scanning No require transmission  saves power Move to each channel, and listen for Beacon frames Active scanning Requires transmission  saves time Move to each channel, and send Probe Request frames to solicit Probe Responses from a network Joining a BSS Synchronization in TSF and frequency : Adopt PHY parameters : The BSSID : WEP : Beacon Period : DTIM

30 Association in AP 1: Association request 2: Association response 3: Data traffic Client

31 Time Synchronization in Timing synchronization function (TSF) AP controls timing in infrastructure networks All stations maintain a local timer TSF keeps timer from all stations in sync Periodic Beacons convey timing Beacons are sent at well known intervals Timestamp from Beacons used to calibrate local clocks Local TSF timer mitigates loss of Beacons

32 Power Management in A station is in one of the three states Transmitter on Receiver on Both transmitter and receiver off (dozing) AP buffers packets for dozing stations AP announces which stations have frames buffered in its Beacon frames Dozing stations wake up to listen to the beacons If there is data buffered for it, it sends a poll frame to get the buffered data

33 IEEE Wireless MAC Support broadcast, multicast, and unicast Uses ACK and retransmission to achieve reliability for unicast frames No ACK/retransmission for broadcast or multicast frames Distributed and centralized MAC access Distributed Coordination Function (DCF) Point Coordination Function (PCF)

DCF (CSMA) Distributed Coordination Function (CSMA/CA) Sense medium. Wait for a DIFS (50 µs) If busy, wait ‘till not busy. Random backoff. If not busy, Tx. Backoff is binary exponential Acknowledgements use SIFS (short interframe spacing). 10 µs. Short spacing makes exchange atomic

DCF (RTS/CTS) 35

36 Discussion RTS/CTS/Data/ACK vs. Data/ACK Why/when is it useful? What is the right choice Why is RTS/CTS not used?

37 Overview Wireless Background Wireless MAC MACAW Wireless TCP

38 Wireless Challenges Force us to rethink many assumptions Need to share airwaves rather than wire Don’t know what hosts are involved Host may not be using same link technology Mobility Other characteristics of wireless Noisy  lots of losses Slow Interaction of multiple transmitters at receiver Collisions, capture, interference Multipath interference

39 TCP Problems Over Noisy Links Wireless links are inherently error-prone Fades, interference, attenuation Errors often happen in bursts TCP cannot distinguish between corruption and congestion TCP unnecessarily reduces window, resulting in low throughput and high latency Burst losses often result in timeouts Sender retransmission is the only option Inefficient use of bandwidth

40 Constraints & Requirements Incremental deployment Solution should not require modifications to fixed hosts If possible, avoid modifying mobile hosts Probably more data to mobile than from mobile Attempt to solve this first

41 Challenge #1: Wireless Bit-Errors Router Computer 2Computer Loss  Congestion Burst losses lead to coarse-grained timeouts Result: Low throughput Loss  Congestion Wireless

Performance Degradation Time (s) Sequence number (bytes) TCP Reno (280 Kbps) Best possible TCP with no errors (1.30 Mbps) 2 MB wide-area TCP transfer over 2 Mbps Lucent WaveLAN 42

43 Proposed Solutions End-to-end protocols Selective ACKs, Explicit loss notification Split-connection protocols Separate connections for wired path and wireless hop Reliable link-layer protocols Error-correcting codes Local retransmission

44 Approach Styles (End-to-End) Improve TCP implementations Not incrementally deployable Improve loss recovery (SACK, NewReno) Help it identify congestion (ELN, ECN) ACKs include flag indicating wireless loss Trick TCP into doing right thing  E.g. send extra dupacks What is SMART? DUPACK includes sequence of data packet that triggered it Wired linkWireless link

45 Approach Styles (Split Connection) Split connections Wireless connection need not be TCP Hard state at base station Complicates mobility Vulnerable to failures Violates end-to-end semantics Wired linkWireless link

Split-Connection Congestion Window Wired connection does not shrink congestion window But wireless connection times out often, causing sender to stall 46

47 Approach Styles (Link Layer) More aggressive local rexmit than TCP Bandwidth not wasted on wired links Adverse interactions with transport layer Timer interactions Interactions with fast retransmissions Large end-to-end round-trip time variation FEC does not work well with burst losses Wired linkWireless link ARQ/FEC

48 Hybrid Approach: Snoop Protocol Shield TCP sender from wireless vagaries Eliminate adverse interactions between protocol layers Congestion control only when congestion occurs The End-to-End Argument [SRC84] Preserve TCP/IP service model: end-to-end semantics Is connection splitting fundamentally important? Eliminate non-TCP protocol messages Is link-layer messaging fundamentally important? Fixed to mobile: transport-aware link protocol Mobile to fixed: link-aware transport protocol

49 Snoop Overview Modify base station to cache un-acked TCP packets … and perform local retransmissions Key ideas No transport level code in base station When node moves to different base station, state eventually recreated there

Snoop Protocol: CH to MH Correspondent Host Mobile Host Base Station Snoop agent: active interposition agent Snoops on TCP segments and ACKs Detects losses by duplicate ACKs and timers Suppresses duplicate ACKs from MH Snoop Agent 50

Snoop Protocol: CH to MH Correspondent Host Mobile Host Base Station Transfer of file from CH to MH Current window = 6 packets Snoop Agent

Snoop Protocol: CH to MH Correspondent Host Mobile Host Base Station Transfer begins Snoop Agent

Snoop Protocol: CH to MH Correspondent Host Mobile Host Base Station Snoop agent caches segments that pass by Snoop Agent 53

Snoop Protocol: CH to MH Correspondent Host Mobile Host Base Station Packet 1 is Lost Snoop Agent 23 1 Lost Packets 1 54

Snoop Protocol: CH to MH Correspondent Host Mobile Host Base Station Packet 1 is Lost Duplicate ACKs generated Snoop Agent 2 3 Lost Packets 1 4 ack 0 55

Snoop Protocol: CH to MH Correspondent Host Mobile Host Base Station Packet 1 is Lost Duplicate ACKs generated Packet 1 retransmitted from cache at higher priority Snoop Agent 2 3 Lost Packets 1 4 ack

Snoop Protocol: CH to MH Correspondent Host Mobile Host Base Station Duplicate ACKs suppressed Snoop Agent ack ack 0 X 57

Snoop Protocol: CH to MH Correspondent Host Mobile Host Base Station 56 Clean cache on new ACK Snoop Agent ack ack 4 58

Snoop Protocol: CH to MH Correspondent Host Mobile Host Base Station 6 Clean cache on new ACK Snoop Agent ack ack 5 ack 4 59

Snoop Protocol: CH to MH Correspondent Host Mobile Host Base Station Active soft state agent at base station Transport-aware reliable link protocol Preserves end-to-end semantics Snoop Agent ack ack 5 60

61 Performance: FH to MH 1/Bit-error Rate (1 error every x Kbits) Throughput (Mbps) Typical error rates 2 MB local-area TCP transfer over 2 Mbps Lucent WaveLAN Snoop+SACK and Snoop perform best Connection splitting not essential TCP SACK performance disappointing TCP Reno SPLIT TCP SACK SPLIT-SACK Snoop Snoop+SACK

Discussion Real link-layers aren’t windowed Out of order delivery not that significant a concern TCP timers are very conservative 62