Introduction to Wireless Networks

Slides:



Advertisements
Similar presentations
Networks: Wireless LANs1 Wireless Local Area Networks.
Advertisements

Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Chapter 6 High-Speed LANs1 Chapter 6 High-Speed LANs.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We’re making these slides freely available.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
Slow Start Backoff Algorithm for Wireless Ad Hoc Networks Der-Jiunn Deng Department of Computer Science and Information Engineering National Changhua University.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Wireless Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering PSTN.
1 Introduction to Wireless Networks Michalis Faloutsos.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
1 Introduction to Wireless Networks Michalis Faloutsos.
1 Challenging the Modeling Assumptions of Mobile Networks Seminar 266 Michalis Faloutsos.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Wireless,
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Wireless LAN Simulation - IEEE MAC Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Computer Networking Bridges/Switches, , PPP.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Chapter 5: The Data Link Layer
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Universität Karlsruhe Institut für Telematik ECE 591
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Getting Connected (Chapter 2 Part 4)
Outline What is Wireless LAN Wireless Transmission Types
Wireless MAC.
Medium Access Control MAC protocols: design goals, challenges,
The University of Adelaide, School of Computer Science
Chapter 6 Wireless and Mobile Networks
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
CS 457 – Lecture 7 Wireless Networks
Wireless Local Area Networks (LANs)
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
Elements of a wireless network
EEC-484/584 Computer Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks
basics Richard Dunn CSE July 2, 2003.
Performance Evaluation of an Integrated-service IEEE Network
Wireless LAN Simulation IEEE MAC Protocol
EEC-484/584 Computer Networks
ECSE-4730: Computer Communication Networks (CCN)
Elements of a wireless network
Wireless LANs CS 352, Lecture 16
Elements of a wireless network
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

Introduction to Wireless Networks Michalis Faloutsos

IEEE 802.11 Wireless LAN - 1 Wireless LANs: untethered (often mobile) networking IEEE 802.11 standard: MAC protocol unlicensed frequency spectrum: 900Mhz, 2.4Ghz

IEEE 802.11 Wireless LAN - 2 Basic Service Set (BSS) (a.k.a. “cell”) contains: wireless hosts access point (AP): base station BSS’s combined to form distribution system (DS)

IEEE 802.11 used for Ad Hoc Networks Ad hoc network: IEEE 802.11 stations can dynamically form network without AP Applications: “laptop” meeting in conference room, car interconnection of “personal” devices battlefield IETF MANET (Mobile Ad hoc Networks) working group

IEEE 802.11 MAC Protocol: CSMA/CA 802.11 CSMA sender: - if sense channel idle for DIFS sec. then transmit entire frame (no collision detection) -if sense channel busy then binary backoff 802.11 CSMA receiver: if received OK return ACK after SIFS

IEEE 802.11 MAC Protocol 802.11 CSMA Protocol: others NAV: Network Allocation Vector 802.11 frame has transmission time field others (hearing data) defer access for NAV time units

Ad Hoc Networks

What is an ad hoc network A collection of nodes that can communicate with each other without the use of existing infrastructure Each node is a sender, a receiver, and a relay There are no “special nodes” (in principal) No specialized routers, no DNS servers Nodes can be static or mobile Can be thought of us: peer-to-peer communication

Example: Ad hoc network Nodes have power range Communication happens between nodes within range

What Is Different Here? Broadcasts of nodes can “overlap” -> collision How do we handle this? A MAC layer protocol could be the answer If one node broadcasts, neighbors keeps quite Thus, nearby nodes compete for air time This is called contention

Contention in ad hoc networks A major difference with wireline networks Air-time is the critical resource Fact 1: connections that cross vertically interfere Fact 2: connections that do not share nodes interfere Fact 3: a single connection with itself interferes!

Example of contention Yellow connection bothers pink connection Yellow bothers itself When A-E is active E-F is silent F-G is silent (is it?) F E G H A B C D

The Hidden Terminal Effect hidden terminals: A, C cannot hear each other obstacles, signal attenuation collisions at B goal: avoid collisions at B CSMA/CA: CSMA with Collision Avoidance

Collision Avoidance: RTS-CTS exchange - 1 CSMA/CA: explicit channel reservation sender: send short RTS: request to send receiver: reply with short CTS: clear to send CTS reserves channel for sender, notifying (possibly hidden) stations Avoid hidden station collisions

Collision Avoidance: RTS-CTS exchange - 2 RTS and CTS short: collisions less likely, of shorter duration end result similar to collision detection IEEE 802.11 allows: CSMA CSMA/CA: reservations polling from AP

The 802.11 MAC protocol A B D C Introduced to reduce collisions RTS RTS A B CTS D C CTS Introduced to reduce collisions Sender sends Request To Send (RTS): ask permission Case A: Receiver gives permission Clear To Send (CTS) Sender sends Data Receiver sends ACK, if received correctly Case B: Receiver does not respond Sender waits, times out, exponential back-off, and tries again

Why is this necessary? RTS A B D CTS C A: RTS, and B replies with a CTS C hears RTS and avoids sending anything C could have been near B (not shown here) D hears CTS so it does not send anything to B

Some numbers for 802.11 Typical radius of power-range: 250m Interference range: 500m At 500m one can not hear, but they are bothered! RTS packet 40 bytes CTS and ACK 39 bytes MAC header is 47 bytes

Typical Simulation Environment A 2-dimensional rectangle Fixed number of nodes Static: uniformly distributed Dynamic: way-point model Pick location, move with speed v, pause Power range: fixed or variable Sender-receivers uniformly distributed

Various Communication Paradigms Broadcasting: one nodes reaches everybody Multicasting: One node reaches some nodes Anycasting: One node reaches a subset of some target nodes (one) Application Layer protocols and overlays Applications like peer-to-peer