WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We’re making these slides freely available.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
Network Technology CSE Network Technology CSE3020 Week 9.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Wireless Networking So we talked about wired networks. What about wireless?
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
1 Introduction to Wireless Networks Michalis Faloutsos.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
MAC Protocol By Ervin Kulenica & Chien Pham.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Wireless,
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
CS 372 – introduction to computer networks* Announcements: r Final exam on Friday  The materials after chapters 1,2  Emphasis on the material covered.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
CWNA Guide to Wireless LANs, Second Edition
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Chapter 6 Multiple Radio Access
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Spring 2006 CPE :Wireless and Mobile Networks I 1 Special Topics in Computer Engineering Wireless and Mobile Networks: I Some of these Slides are.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Outline What is Wireless LAN Wireless Transmission Types
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
CS 457 – Lecture 7 Wireless Networks
EEC-484/584 Computer Networks
Wireless LAN Simulation IEEE MAC Protocol
EEC-484/584 Computer Networks
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

WIRELESS COMMUNICATION Husnain Sherazi Lecture 1

Wireless Communication Networks It is a type of computer network which does not require wires between the network devices. It uses radio waves to connect different devices. Wireless networks are convenient. Mobility. Expandable. Easy connectivity. Normally less costly.

Wireless Networks

Elements of Wireless Networks

Link Characteristics

Wired vs. Wireless Networks Wired NetworksWireless Networks Based on CablesBased on radio frequencies Communication within metersCommunication over kilometers SecureLess secure Not MobileMobile Less interferenceMore Interference Cable expensesNo cable expenses Difficult to setupEasy to setup Difficult to manageEasy to manage Nodes are visibleNodes are not always visible

Wireless Hopping Wireless hopping means whether the data is transferred directly to the end device or by jumping from one device to other and then the end device. Wireless Hopping can be Single Hop Infrastructure based Single Hop Infrastructure less Multi Hops Infrastructure based Multi Hops Infrastructure less

Single Hop Infrastructure based These networks have base stations. These base stations are connected with wired networks All the communication is done between the base stations and the end devices. All this communication is done directly on a single hop Networks fall in this category. Wi-Fi networks used in classroom and café etc. are all part of Single Hop Infrastructure based.

Single Hop Infrastructure based

Single Hop Infrastructure less These networks have no base stations. No base stations are connected with wired networks. Communication is done by one coordinator (node). This coordinator node transmits for others as well. A node connects with other node to be a part of that network. All this communication is done directly on a single hop. Bluetooth networks fall in this category. Ad-hoc networks are also example of Single Hop Infrastructure less.

Single Hop Infrastructure less

Multi Hop Infrastructure based These networks have base stations. These base stations are connected with wired networks. Nodes can communicate with the base station directly and sometimes by using other nodes for communication. This communication of nodes with base station using other nodes is done through multi hops. Some wireless sensor networks fall in this category.

Multi Hop Infrastructure based Base Station Node

Multi Hop Infrastructure less These networks have no base stations. No base stations are connected with wired networks. Nodes have to transmit data to the destination by relaying on other nodes. Such communication is done using Multi Hop but with no base station. Mobile Ad-hoc Networks and Vehicular Ad-hoc Networks are part of this network

Multi Hop Infrastructure less

and Wireless LANs The most commonly used Wireless LAN is IEEE It is also called Wi-Fi ( Wi reless Fi delity). Several standards are available a b g n Most popular these days are combination of these standards (802.11a/b/g) or (802.11b/g).

and Wireless LANs These standards share some same attributes CSMA/CA Support for Infrastructure and Ad-hoc mode Ability to reduce transmission rate to reach out more distance A new standard n is used for multiple inputs and outputs.

Architecture The most important building block of a Architecture is a Basic Service Set (BSS). A BSS can have one or more nodes. BSS can also have a central device; Access Point (AP). These APs can connect to other devices like Router and Switches. In a Home network, there is only one Router and one Access Point which are sometimes combined into a Wireless Router.

Architecture

This network can be Ad-Hoc. In an Ad-Hoc network, nodes can group themselves without any need of a central device (AP). In Ad-Hoc network, connection is made by the devices in near proximity. Normally this type of network is made when nodes want to transfer data to each other and there is no central device available.

Architecture Ad-Hoc Network

Channel and Associations When AP is installed, it is provided with Service Set Identifier (SSID) Channel Number When a node enters the range of an AP, it must associate with AP to use the internet. Node can associate with exactly one AP. The associated AP can only send and receive the frames to and from the node. To associate with an AP, the node should accept the beacon frames sent by an AP.

Channel and Associations Beacon Frame SSID of AP MAC address of AP AP sends beacon frames periodically and nodes can listen to these beacon frames.

Active and Passive Scanning Nodes can scan different channels for beacon frames from APs. This scanning is called Passive Scanning. Nodes can broadcast a probe frame to all the APs in range. APs respond to this request from Nodes. This scanning is called Active Scanning. Association Request and Response are used in Passive Scanning. Probe Request, Probe Response and Association Request and Association Response are used in Active Scanning.

Active and Passive Scanning

MAC Protocol In Wireless communication, there are chances that data can be lost because of several reasons. To avoid data loss, we can use acknowledgment called Link Layer Acknowledgment Scheme. In this scheme, when receiver receives the frame, it wait for some time and then sends the acknowledgment. This wait time is called Short Inter-Frame Spacing (SIFS). If acknowledgment is not received by sender, it will retransmit. If retransmit acknowledgments are received for fixed time, the frames are discarded.

Distributed Inter-Frame Space Short Inter-Frame Space

CSMA/CA To overcome the problem of collision, Ethernet uses a technique called CSMA/CD. However in Wireless communication, a different technique is used to overcome collision. In Wireless communication, it is called Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA)

CSMA/CA Node checks the channel Channel Idle? Node waits for some time called DIFS and then transmits the frames Node choses a backoff value and counts it down till 0. Transmits the frames if value reaches 0. Waits for acknowledgment NoYes

CSMA/CA In Wireless transmission, the target is to avoid collision instead of detecting collision. So a backoff value is used to count down till 0, before the frame is sent to destination. This wait time is called Distributed Inter-Frame Space. The value of backoff will be reduced only when the channel is idle. If the channel is busy, the value of backoff will be frozen.

Hidden Terminals There are scenarios in which nodes are hidden from each other. If two nodes are associating with an AP. Nodes might be very far from each other so that they cannot listen to each other. However AP can listen to both the nodes. In this case, there are chances of collision, since both the nodes do not see each other.

Hidden Terminals

Hidden terminals A sends to B, C cannot receive A C wants to send to B, C senses a “free” medium (CS fails) collision at B, A cannot receive the collision (CD fails) A is “hidden” for C Exposed terminals B sends to A, C wants to send to another terminal (not A or B) C senses carrier, finds medium in use and has to wait A is outside the radio range of C, therefore waiting is not necessary C is “exposed” to B Hidden and Exposed Terminals BAC

CSMA/CA To avoid collision, two concepts are used RTS (Request to Send) CTS (Clear to Send) Whenever a node wants to send some data, it will send a RTS to AP. AP after receiving the request will broadcast a CTS to make sure no other node uses the channel. Node can now send the data to AP. AP after receiving the data will send an acknowledgment.