CMPT771 Wireless Media 1 Wireless Basics CMPT 771 Internet Architecture and Protocols.

Slides:



Advertisements
Similar presentations
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Advertisements

Network Layer4-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes (bridges and switches too) r communication channels that connect.
5: DataLink Layer5a-1 MAC Sublayer. 5: DataLink Layer5a-2 Multiple Access Links and Protocols Two types of “links”: r point-to-point m PPP for dial-up.
6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non-mobile) or.
11/11/ /13/2003 DLL, Error Detection, MAC, ARP November 11-13, 2003.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
DataLink Layer session 1 TELE3118: Network Technologies Week 2: Data Link Layer Framing, Error Control, Multiple Access Some slides have been taken.
Wireless Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering PSTN.
1 Introduction to Wireless Networks Michalis Faloutsos.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
5: DataLink Layer5-1 Link Layer – Error Detection/Correction and MAC.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5: DataLink Layer5-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
1 Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Monday March 12, 2007 Acknowledgement:
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
CSC4220/6220 Computer Networks
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer multiple.
Medium Access Control NWEN302 Computer Network Design.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Network Layer4-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes (bridges and switches too) r communication channels that connect.
Ethernet Frame Structure Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame Preamble: 7 bytes with pattern.
5: DataLink Layer5-1 The Data Link Layer Chapter 5 Kurose and Ross Today 5.1 and 5.3.
Multiple Access Links and Protocols
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
1 Quick Review on Data Link Layer – Part 2 Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Transport Layer 3-1 Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-layer Addressing.
Introduction to Wireless Networking Dimitrios Koutsonikolas 01/27/2016 These slides contain material developed by Lili Qiu for CS386W at UT Austin and.
5: DataLink Layer5-1 Slotted ALOHA Assumptions r all frames same size r time is divided into equal size slots, time to transmit 1 frame r nodes start to.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 5 Link Layer and LANs
Computer Communication Networks
Computer Communication Networks
Services of DLL Framing Link access Reliable delivery
Multiple access.
CS 457 – Lecture 7 Wireless Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
Overview Jaringan Komputer (3)
Introduction to Wireless Networks
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Link Layer 5.1 Introduction and services
ECSE-4730: Computer Communication Networks (CCN)
Link Layer: Multiple Access
Presentation transcript:

CMPT771 Wireless Media 1 Wireless Basics CMPT 771 Internet Architecture and Protocols

CMPT771 Wireless Media 2 Wireless Basics Two types of “links”: r point-to-point m PPP for dial-up access m point-to-point link between Ethernet switch and host r broadcast (shared wire or medium) m traditional Ethernet m Satellite m wireless LAN m Cellular Or lecture room

CMPT771 Wireless Media 3 Multiple Access protocols r single shared broadcast channel r two or more simultaneous transmissions by nodes: interference m only one node can send successfully at a time multiple access protocol r algorithm that determines how nodes share channel, i.e., determine when node can transmit r communication about channel sharing must use channel itself! r what to look for in multiple access protocols:

CMPT771 Wireless Media 4 Ideal Mulitple Access Protocol Broadcast channel of rate R bps 1. When one node wants to transmit, it can send at rate R. 2. When M nodes want to transmit, each can send at average rate R/M 3. Fully decentralized: m no special node to coordinate transmissions m no synchronization of clocks, slots 4. Simple

CMPT771 Wireless Media 5 Channel Partitioning MAC protocols: TDMA TDMA: time division multiple access r access to channel in "rounds" r each station gets fixed length slot (length = pkt trans time) in each round r example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle r Problem m unused slots go idle

CMPT771 Wireless Media 6 Channel Partitioning MAC protocols: FDMA FDMA: frequency division multiple access r channel spectrum divided into frequency bands r each station assigned fixed frequency band r example: 6-station LAN, 1,3,4 have pkt, frequency bands 2,5,6 idle r Problem m unused transmission time in frequency bands go idle frequency bands time

CMPT771 Wireless Media 7 Channel Partitioning (CDMA) CDMA (Code Division Multiple Access) r Analogy m Public Key Encryption Only the one holing the key can decrypt r Motivation m Sender – Mix information encoded with “codes” of receivers m Receiver – Decode mixed information using its own code, and find that for itself

CMPT771 Wireless Media 8 Channel Partitioning (CDMA) CDMA (Code Division Multiple Access) r used mostly in wireless broadcast channels (cellular, satellite, etc) r unique “code” assigned to each user; i.e., code set partitioning r all users share same frequency, but each user has own “chipping” sequence (i.e., code) to encode data r encoded signal = (original data) X (chipping sequence) r decoding: inner-product of encoded signal and chipping sequence r allows multiple users to “coexist” and transmit simultaneously with minimal interference (if codes are “orthogonal”)

CMPT771 Wireless Media 9 CDMA Encode/Decode

CMPT771 Wireless Media 10 CDMA: two-sender interference

CMPT771 Wireless Media 11 CDMA: two-sender interference Assume codes (1,-1) for recv1 (1,1) for recv2 Data bit 1 for recv 1: 1·(1,-1) Decoded using code for recv1: 1·(1,-1) ·(1,-1) =(1,-1) ·(1,-1)=2 Decoded using code for recv 2: 1·(1,-1) ·(1,1) =(1,-1) ·(1,1)=0

CMPT771 Wireless Media 12 Random Access Protocols r When node has packet to send m transmit at full channel data rate R. m no a priori coordination among nodes r two or more transmitting nodes -> “collision”, r random access MAC protocol specifies: m how to detect collisions m how to recover from collisions (e.g., via delayed retransmissions) r Examples of random access MAC protocols: m slotted ALOHA m ALOHA m CSMA, CSMA/CD (Ethernet), CSMA/CA ( WLAN or Wi-Fi)

CMPT771 Wireless Media 13 Slotted ALOHA Assumptions r all frames same size r time is divided into equal size slots, time to transmit 1 frame r nodes start to transmit frames only at beginning of slots r nodes are synchronized r if 2 or more nodes transmit in slot, all nodes detect collision Operation r when node obtains fresh frame, it transmits in next slot r no collision, node can send new frame in next slot r if collision, node retransmits frame in each subsequent slot with prob. p until success

CMPT771 Wireless Media 14 Slotted ALOHA Pros r single active node can continuously transmit at full rate of channel r highly decentralized: only slots in nodes need to be in sync r simple Cons r collisions, wasting slots r idle slots r nodes may be able to detect collision in less than time to transmit packet – but sill waste a slot

CMPT771 Wireless Media 15 Pure (unslotted) ALOHA r unslotted Aloha: simpler, no synchronization r when frame first arrives m transmit immediately r collision probability increases: m frame sent at t 0 collides with other frames sent in [t 0 -1,t 0 +1]

CMPT771 Wireless Media 16 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: r If channel sensed idle: transmit entire frame r If channel sensed busy, defer transmission r No time slot – fully distributed r Human analogy: listen and don’t interrupt others r Seems perfect – no collision !

CMPT771 Wireless Media 17 CSMA collisions collisions can still occur: propagation delay means two nodes may not hear each other’s transmission collision: entire packet transmission time wasted spatial layout of nodes note: role of distance & propagation delay in determining collision probability

CMPT771 Wireless Media 18 CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA m collisions detected within short time m colliding transmissions aborted, reducing channel wastage r collision detection: m easy in wired LANs: measure signal strengths, compare transmitted, received signals m difficult in wireless LANs: receiver shut off while transmitting r human analogy: the polite conversationalist

CMPT771 Wireless Media 19 CSMA/CD collision detection

CMPT771 Wireless Media 20 IEEE Wireless LAN r b (1999) m GHz unlicensed radio spectrum m up to 11 Mbps m direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code r All use CSMA/CA for multiple access r All have base-station and ad-hoc network versions r a (1999) m 5-6 GHz range m up to 54 Mbps r g (2003) m GHz range m up to 54 Mbps r n (2009) m 2.4/5GHz, MIMO m OFDM (instead of DSSS)

CMPT771 Wireless Media 21 Base station approach r Wireless host communicates with a base station m base station = access point (AP) r Basic Service Set (BSS) (a.k.a. “cell”) contains: m wireless hosts m access point (AP): base station

CMPT771 Wireless Media 22 Ad Hoc Network approach r No AP (i.e., base station) r wireless hosts communicate with each other m to get packet from wireless host A to B may need to route through wireless hosts X,Y,Z r Applications: m “laptop” meeting in conference room, car m interconnection of “personal” devices m battlefield r IETF MANET (Mobile Ad hoc Networks) working group

CMPT771 Wireless Media 23 IEEE : multiple access r Collision if 2 or more nodes transmit at same time r CSMA makes sense: m get all the bandwidth if you’re the only one transmitting m try to avoid collision if you sense another transmission

CMPT771 Wireless Media 24 IEEE MAC Protocol: CSMA CSMA: sender - if sense channel idle for DISF sec. then transmit entire frame (no collision detection) -if sense channel busy then binary backoff CSMA receiver - if received OK return ACK after SIFS (make sure no collision)

CMPT771 Wireless Media 25 Enhancement: CSMA/CD ? r Collision detection doesn’t work: hidden terminal problem

CMPT771 Wireless Media 26 Collision avoidance mechanisms r Problem: m two nodes, hidden from each other, transmit complete frames to base station m wasted bandwidth for long duration ! r Solution: m small reservation packets m nodes track reservation interval with internal “network allocation vector” (NAV)

CMPT771 Wireless Media 27 Collision Avoidance: RTS-CTS exchange r sender transmits short RTS (request to send) packet: indicates duration of transmission r receiver replies with short CTS (clear to send) packet m notifying (possibly hidden) nodes r hidden nodes will not transmit for specified duration: NAV

CMPT771 Wireless Media 28 Collision Avoidance: RTS-CTS exchange r RTS and CTS short: m collisions less likely, of shorter duration m end result similar to collision detection r IEEE allows: m CSMA m CSMA/CA: reservations m polling from AP

CMPT771 Wireless Media 29 IEEE MIMO

Wireless Technology Evolution

CMPT771 Wireless Media 31 Progress: 1G/2G Wireless Cellular Networks r First generation - analog r Second generation cellular network (1992-) m Technology: TDMA, TDMA hybrid FDMA Systems: DAMPS(USA, IS-54), GSM m Technology: CDMA (Qualcomm) Systems: CDMA(IS-95) m Pros (vs 1G) Higher Frequency available, good Security, soft Capacity (with CDMA), higher Capacity m Cons (vs 3G) Speech Service, lower rate, no multimedia Service and no higher rate Service

CMPT771 Wireless Media 32 Progress: 3G Wireless Networks r Third generation 3G (1996-) m Objective truly anybody at any place to communicate with anyone at any time m Support Multimedia Service 144kb/s(Outdoor and higher velocity ), 384kb/s(from Outdoor to indoor, lower velocity), 2Mb/s(indoor) m Standards Japan: WCDMA (TDD/FDD) Europe: WCDMA (FDD model) and TD-CDMA(TDD). America: CDMA-2000 (TDD) China: TD-SCDMA(1998)

CMPT771 Wireless Media 33 Progress: 4G Wireless Networks r 4G Wireless Networks: Objective m Support interactive multimedia services: teleconferencing, wireless Internet, etc m Global mobility and service portability m Higher rate, lower cost r What's New in 4G m Entirely packet-switched networks m All network elements are digital m Higher bandwidths to provide multimedia services m Tight network security. r 3G vs 4G m Circuit and packet switchiong/Entirely packet switched networks m Combination of existing & evolved equipment/All digital elements m Data rate (up to 2Mbps)/Higher rate (up to 100Mbps) r Technology m MIMO-OFDM (Orthogonal Frequency division multiplexing) ?

WiMax r “Worldwide Interoperability for Microwave Access” m WiMAX is a standards-based Broadband Wireless Access m fast broadband connections over long distances r Standard based: Wireless MAN by IEEE m d: Fixed WiMAX (Jun. 2004) m e: Mobile WiMAX (Nov. 2005) m Industry to create interoperable complete ecosystem r WiMAX Forum (2001), Intel etc. involved m Claims there are over 455 WiMAX networks deployed in over 135 countries

LTE (Long Term Evolution) r LTE Air-interface m Downlink OFDM m Uplink SC-FDMA m Mutiple Antenna Scheme (MIMO)

WiMaX vs LTE (4G and beyond)

CMPT771 Wireless Media 37 More on Wireless Media r Power optimization m Transmission power m Circuit power r Joint source-channel coding m Channel ? r Roaming m Hand off m Vertical hand off r …