Wireless LANs Wireless proliferating rapidly.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Networks: Wireless LANs1 Wireless Local Area Networks.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Wireless LANs and Introduction to IP Slide Set 7.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Networks: Wireless LANs1 Wireless Local Area Networks.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Networks: Wireless LANs1 Wireless Local Area Networks.
1 Introduction to Wireless Networks Michalis Faloutsos.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
1 Other LANs Token Rings Wireless –Wireless LAN (802.11, WiFi) –Broadband Wireless (802.16) –Bluetooth.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Mozafar Bag-Mohammadi University of Ilam
WLAN.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Media Access Methods MAC Functionality CSMA/CA with ACK
Outline What is Wireless LAN Wireless Transmission Types
Wireless MAC.
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
Communication Networks: Technology & Protocols
Chapter 6 Wireless and Mobile Networks
Computer Communication Networks
University of Pittsburgh
Network connectivity to the legacy wired LAN
MACAW: A Media Access Protocol for Wireless LAN’s
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Wireless Networks.
Medium Access Control (MAC) Sub-layer
CS 457 – Lecture 7 Wireless Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
Elements of a wireless network
EEC-484/584 Computer Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks
basics Richard Dunn CSE July 2, 2003.
Introduction to Wireless Networks
Wireless LAN Simulation IEEE MAC Protocol
EEC-484/584 Computer Networks
ECSE-4730: Computer Communication Networks (CCN)
Conducted and Wireless Media (Part II)
Elements of a wireless network
Network connectivity to the legacy wired LAN
Mozafar Bag-Mohammadi University of Ilam
Wireless LANs CS 352, Lecture 16
Wireless LAN Protocols
Elements of a wireless network
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

Wireless LANs Wireless proliferating rapidly. IEEE 802.11 --> link access standard designed for use in a limited geographic setting. Various versions 802.11a, 802.11e, 802.11g, 802.11n. Physical layer evolution -- increased rates . As an example, 802.11n uses multiple antennas -- can provide very high data rates.

Physical Properties Typically use 3 kinds of physical media -- two based on spread-spectrum and one based on IR. IR : transmission is diffused; limited range. (not much in use) Spread spectrum -- spread signal over a higher frequency -- provides reduced impact from external interference. more robustness to signal loss.

Fading Signal travels and reflects off objects. Multiple copies converge at receiver (Red copy and Green copy). Copies interfere -- may self destruct -- called multipath fading. Signal combination depends on frequency of transmission.

Spread Spectrum The use of larger bandwidth provides robustness to fading/interference. Wiped out frequencies

Frequency hopped Spread Spectrum Transmit signal over a random sequence of frequencies (not really random but pseudo-random). Computed using a pseudo-random sequence generator. Receiver uses the same generator -- they can synchronize (same seed).

Direct Sequence Spread Spectrum Each bit translated into ‘N’ random symbols called chips. Random chips generated using the pseudo-random number generator. Transmitted sequence called a n-bit chipping code. If receiver knows the chips, it can decode. Others cannot, they see a higher frequency signal -- can be filtered out as noise.

802.11 PHY layers One PHY layer uses frequency hopping over a 79.1 MHz range. A second version uses a 11 bit chipping sequence. Both run in the 2.4 GHz band. Note: For other than the intended receiver signal looks like noise.

Medium Access Control Can we use the same protocol as in the Ethernet ? Carrier Sensing -- Sense channel, transmit when channel is idle, back-off when collision occurs ? Not really -- why ?

Hidden Terminals B can talk to A and C but not D. C can talk to B and D but not A. A sends to B -- C cannot make out (cannot sense), and it sends to D. Collision at B :(. A and C are hidden from each other -- hidden terminal problem.

Exposed Terminals On the other hand, if B is sending A, C will sense channel to be busy. Will not send to D. Not good either! C is “exposed” to B’s transmission.

The MACA scheme 802.11 addresses these problems by using an algorithm called MACA -- multiple access with collision avoidance. Also referred to as “virtual carrier sensing”. Sender sends a “Request to Send” or RTS to Receiver. Tells sender’s neighbors of intent to send. Receiver sends a “Clear to send” or CTS to sender. Tells receivers neighbors of intent to receive.

Example A sends to B. A’s RTS tells everyone in its neighborhood that it is sending. B’s CTS tells everyone in its neighborhood that it is receiving. Now C knows that B is receiving and does not initiate communications with D.

Details RTS indicates the time for which the sender wishes to hold the channel. Receiver echoes this “duration” field to the sender. Every node knows -- how long the transmission is for.

Data transfer Upon a successful RTS/CTS exchange, nodes initiate data transfer. Receiver sends ACK after successfully receiving frame. Exposed terminal issue left alone Random wait when CTS is not received Back-off similar to what happens with Ethernet.

Access Points While 802.11 facilitates operations in an “ad hoc” mode, typically, some of the wireless nodes connected to a wireline infrastructure. These are called access points (APs) -- some people also call them base-stations (more appropriate for cellular networks) Other mobile hosts connect to the Internet via these APs.

Distribution System APs connected via the distribution system -- could be Ethernet or FDDI based (or anything else). Distribution system runs at Layer 2 -- not Layer 3 (Network Layer) entity.

Selection of APs Via a process called scanning. When a node wants to select an AP, it sends a probe message. APs that get this, respond with a Probe-Response. Node selects one of the APs (strongest signal ?),and sends an Association Request. Selected AP responds with an Association Response. Active scanning -- Probes sent actively when mobile joins the network or moves around and out of coverage. Passive scanning -- APs send beacons -- mobiles hear and if they find a more attractive AP, they can switch.