Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © 2008 1 Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.

Slides:



Advertisements
Similar presentations
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Advertisements

6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We’re making these slides freely available.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Wednesday March 14, 2007 Acknowledgement:
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Wireless,
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
Lecture 4 Wireless Medium Access Control
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
CMPT771 Wireless Media 1 Wireless Basics CMPT 771 Internet Architecture and Protocols.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Chapter 6 Multiple Radio Access
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
1 CSCD 433 Network Programming Fall 2013 Lecture 7 Ethernet and Wireless
Final Exam Wednesday 3/18/2015 Tech LR PM 1.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
OVERVIEW Lecture 3 Wireless Networks (2). Lecture 3: Wireless Networks 2 CDMA: two-sender interference.
6: Wireless and Mobile Networks6-1 Chapter 6 outline 6.1 Introduction Wireless r 6.2 Wireless links, characteristics m CDMA r 6.3 IEEE wireless.
Universität Karlsruhe Institut für Telematik ECE 591
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Spring 2006 CPE :Wireless and Mobile Networks I 1 Special Topics in Computer Engineering Wireless and Mobile Networks: I Some of these Slides are.
6: Wireless and Mobile Networks6-1 Chapter 6 outline 6.1 Introduction Wireless r 6.2 Wireless links, characteristics m CDMA r 6.3 IEEE wireless.
Introduction to Wireless Networking Dimitrios Koutsonikolas 01/27/2016 These slides contain material developed by Lili Qiu for CS386W at UT Austin and.
6-1 Last time □ Ethernet ♦ frame structure ♦ CSMA/CD algorithm □ Hubs ♦ physical-layer repeaters ♦ make one large collision domain □ Switches ♦ link-layer.
Chapter 5 Link Layer and LANs
Dimitrios Koutsonikolas
Dimitrios Koutsonikolas
Chapter 6 Wireless and Mobile Networks
Multiple access.
CS 457 – Lecture 7 Wireless Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
Elements of a wireless network
EEC-484/584 Computer Networks
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Wireless LAN Simulation IEEE MAC Protocol
EEC-484/584 Computer Networks
Elements of a wireless network
Wireless LANs CS 352, Lecture 16
Chapter 6 Multiple Radio Access.
Presentation transcript:

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical Engineering National Taiwan University

Network and Systems Laboratory nslab.ee.ntu.edu.tw Zigbee Stack Designed for indoor home appliances Routing MAC Copyright ©

Network and Systems Laboratory nslab.ee.ntu.edu.tw Radio Coverage Good linkGrey linkBad link Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Problems in Networking No one node can reach every other node Need multiple routing Each node can reach a high number of other nodes Need MAC with collision avoidance No link is 100% reliable Need (quasi-)reliable data transport Copyright ©

Network and Systems Laboratory nslab.ee.ntu.edu.tw Ad Hoc Routing Multi-hop Routing for Wireless Network Copyright ©

Network and Systems Laboratory nslab.ee.ntu.edu.tw Ad Hoc Network A collection of wireless and/or mobile nodes Forming a spontaneous network Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Ad Hoc Routing Finding a path Each host is also a router ? Simplest Solution Shortest path routing Ex: Distance Vector or Link State Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Temporally-Ordered Routing Algorithm (TORA) Presented INFOCOM ’ 97 by Park and Carson Think about it as water flowing through tubes on its way to a destination Node broadcasts a QUERY packet, recipient broadcasts an UPDATE packet Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Route Creation Example Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Ad Hoc On-Demand Distance Vector (AODV) Presented as Internet-Draft, Perkins and Royer, 1997 Takes the basic On-demand mechanism of Route Discovery and Maintenance from DSR Plus hop-by-hop routing, etc from DSDV Source broadcasts a Route Request packet, recipient sends back a Route Reply packet Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw AODV Example Route Request Route Reply Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Wireless MAC Copyright ©

Network and Systems Laboratory nslab.ee.ntu.edu.tw Types of MAC Reservation Based Allocating a certain amount of resource Exclusive for a particular node Example: TDMA, FDMA, CDMA For cellular networks Random Access Sharing the channel Listen and try Example: CSMA, CSMA/CD, CSMA/CA For WiFi Copyright ©

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Time Division Multiple Access Access to channel in "rounds" Each station gets fixed length slot in each round Length = packet transmission time Unused slots go idle Example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Frequency Division Multiple Access Channel spectrum divided into frequency bands Each station assigned fixed frequency band Unused transmission time in frequency bands go idle Example: 6-station LAN, 1,3,4 have pkt, frequency bands 2,5,6 idle frequency bands time

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Carrier Sense Multiple Access CSMA: listen before transmit: If channel sensed idle: transmit entire frame If channel sensed busy, defer transmission Human analogy: don’t interrupt others!

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © CSMA Collisions collisions can still occur: propagation delay means two nodes may not hear each other’s transmission collision: entire packet transmission time wasted spatial layout of nodes

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA Collisions detected within short time Colliding transmissions aborted, reducing channel wastage Human analogy: the polite conversationalist

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © CSMA/CD Illustrated

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Collision Detection in Wireless Can’t sense all collisions in any case: Hidden terminal Signal fading goal: avoid collisions: CSMA/C(ollision)A(voidance) A B C A B C A’s signal strength space C’s signal strength

Network and Systems Laboratory nslab.ee.ntu.edu.tw CSMA/CA Collision Avoidance sender if sense channel idle for DIFS then transmit entire frame (no CD) if sense channel busy then 1. start random backoff time 2. timer counts down while channel idle 3. transmit when timer expires 4. if no ACK, increase random backoff interval, repeat receiver if frame received OK return ACK after SIFS (ACK needed due to hidden terminal, fading problems) Copyright © sender receiver DIFS data SIFS ack

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Really Avoiding Collisions idea: allow sender to “reserve” channel rather than random access of data frames: avoid collisions of long data frames Sender first transmits small request-to-send (RTS) packets using CSMA RTSs may still collide with each other (but they’re short) Receiver broadcasts clear-to-send CTS in response to RTS RTS/CTS heard by all nodes sender transmits data frame other stations defer transmissions Avoid data frame collisions completely using small reservation packets!

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © CSMA/CA - Illustrated Receiver A B time RTS(A) RTS(B) RTS(A) CTS(A) DATA (A) ACK(A) reservation collision defer

Network and Systems Laboratory nslab.ee.ntu.edu.tw Zigbee Stack AODV Identifying single path On-demand for mobile network CSMA-like MAC Listen before transmit Ack optional RTS/CTS optional Copyright ©

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Questions?