Wireless LANs and Introduction to IP Slide Set 7.

Slides:



Advertisements
Similar presentations
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Advertisements

20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPv4 - The Internet Protocol Version 4
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Network Layer Packet Forwarding IS250 Spring 2010
1 Computer Networks IP: The Internet Protocol. 2 IP is a connection-less, unreliable network layer protocol IP provides best effort services in the sense.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
CSE331: Introduction to Networks and Security Lecture 7 Fall 2002.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
1 Chapter 1 OSI Architecture The OSI 7-layer Model OSI – Open Systems Interconnection.
Network Layer Last Update Copyright Kenneth M. Chipps Ph.D.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Lecture 3 Overview. Protocol An agreed upon convention for communication both endpoints need to understand the protocol. Protocols must be formally defined.
Dr. John P. Abraham Professor UTPA
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 21.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
CS 4396 Computer Networks Lab
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Mozafar Bag-Mohammadi University of Ilam
WLAN.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
1 Internetworking: IP Packet Switching Reading: (except Implementation; pp )
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 19 Network Layer Protocols
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
IP - The Internet Protocol
The University of Adelaide, School of Computer Science
Scaling the Network: The Internet Protocol
Wireless LANs Wireless proliferating rapidly.
OSI Protocol Stack Given the post man exemple.
IP - The Internet Protocol
Medium Access Control (MAC) Sub-layer
CS 457 – Lecture 7 Wireless Networks
Net 431: ADVANCED COMPUTER NETWORKS
IP - The Internet Protocol
Dr. John P. Abraham Professor UTPA
EEC-484/584 Computer Networks
Chapter 20 Network Layer: Internet Protocol
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
IP - The Internet Protocol
Dr. John P. Abraham Professor UTPA
Net 323 D: Networks Protocols
EEC-484/584 Computer Networks
IP - The Internet Protocol
Scaling the Network: The Internet Protocol
Mozafar Bag-Mohammadi University of Ilam
ITIS 6167/8167: Network and Information Security
IP - The Internet Protocol
Presentation transcript:

Wireless LANs and Introduction to IP Slide Set 7

Wireless LANs Wireless proliferating rapidly. IEEE > link access standard designed for use in a limited geographic setting. Various versions a, e, g, n. Physical layer evolution -- increased rates. As an example, n uses multiple antennas -- can provide very high data rates.

Physical Properties Typically use 3 kinds of physical media -- two based on spread-spectrum and one based on IR. IR : limited range. (not much in use) Spread spectrum -- spread signal over a higher frequency -- provides –reduced impact from external interference. –more robustness to signal loss.

Fading Signal travels and reflects off objects. Multiple copies converge at receiver (Red copy and Green copy). Copies interfere -- may self destruct -- called multipath fading. Signal combination depends on frequency of transmission.

Spread Spectrum The use of larger bandwidth provides robustness to fading/interference. Wiped out frequencies

Frequency hopped Spread Spectrum Transmit signal over a random sequence of frequencies (not really random but pseudo-random). Computed using a pseudo-random sequence generator. Receiver uses the same generator -- they can synchronize (same seed).

Direct Sequence Spread Spectrum Each bit translated into ‘N’ random symbols called chips. Random chips generated using the pseudo-random number generator. Transmitted sequence called a n-bit chipping code. If receiver knows the chips, it can decode. Others cannot, they see a higher frequency signal -- can be filtered out as noise.

PHY layers One PHY layer uses frequency hopping over a 79.1 MHz range. A second version uses a 11 bit chipping sequence. Both run in the 2.4 GHz band. Note: For other than the intended receiver signal looks like noise.

Medium Access Control Can we use the same protocol as in the Ethernet ? Carrier Sensing -- Sense channel, transmit when channel is idle, back- off when collision occurs ? Not really -- why ?

Hidden Terminals B can talk to A and C but not D. C can talk to B and D but not A. A sends to B -- C cannot make out (cannot sense), and it sends to D. Collision at B :(. A and C are hidden from each other -- hidden terminal problem.

Exposed Terminals On the other hand, if B is sending A, C will sense channel to be busy. Will not send to D. Not good either! C is “exposed” to B’s transmission.

The MACA scheme addresses these problems by using an algorithm called MACA -- multiple access with collision avoidance. – Also referred to as “virtual carrier sensing”. Sender sends a “Request to Send” or RTS to Receiver. – Tells sender’s neighbors of intent to send. Receiver sends a “Clear to send” or CTS to sender. – Tells receivers neighbors of intent to receive.

Example A sends to B. A’s RTS tells everyone in its neighborhood that it is sending. B’s CTS tells everyone in its neighborhood that it is receiving. – Now C knows that B is receiving and does not initiate communications with D.

Details RTS indicates the time for which the sender wishes to hold the channel. Receiver echoes this “duration” field to the sender. Every node knows -- how long the transmission is for.

Data transfer Upon a successful RTS/CTS exchange, nodes initiate data transfer. Receiver sends ACK after successfully receiving frame. –Exposed terminal issue left alone Random wait when CTS is not received – Back-off similar to what happens with Ethernet.

Access Points While facilitates operations in an “ad hoc” mode, typically, some of the wireless nodes connected to a wireline infrastructure. These are called access points (APs) -- some people also call them base-stations (more appropriate for cellular networks) Other mobile hosts connect to the Internet via these APs.

Distribution System APs connected via the distribution system -- could be Ethernet or FDDI based (or anything else). Distribution system runs at Layer 2 -- not Layer 3 (Network Layer) entity.

Selection of APs Via a process called scanning. When a node wants to select an AP, it sends a probe message. APs that get this, respond with a Probe-Response. Node selects one of the APs (strongest signal ?),and sends an Association Request. Selected AP responds with an Association Response. Active scanning -- Probes sent actively when mobile joins the network or moves around and out of coverage. Passive scanning -- APs send beacons -- mobiles hear and if they find a more attractive AP, they can switch.

Rest of Chapter 2 Read about Frame format. Section 2.9 about Network adaptors and Device Drivers -- self study. We skip Chapter 3 and move on to Chapter 4.

Chapter 4: Internetworking and IP

The Internet A Network of Networks A Logical interconnection of physical networks.

The Internet Protocol Architecturally above the Link layer. Ties together various link layer possibilities.

Service Model Best effort -- no delivery guarantees. Fundamental unit is the IP datagram. –Sent in a connectionless manner. –No advance set up. – Datagram contains enough info. to let network forward it to correct destination. –Unreliable.

The IP Datagram HLen --Header Length TOS -- Type of Service -- can distinguish connections. Set priorities. Length -- Maximum size = 64 KB = 65,535 B TTL -- time to leave -- discard packets that have been going around in loops. In terms of hop count (was originally in seconds)

More about the datagram Protocol -- Binds with transport layer -- TCP/UDP. Checksum -- Consider IP datagram as a sequence of 16 bit words. Add words. Take one’s complement. Destination/ Source address bits for IPv4. Flags and Offset - used in fragmentation/reassembly

Fragmentation/Reassembly Each underlying network has a max frame size -- Ethernet 1500 bytes/ FDDI bytes. MTU -- largest IP unit that the network can carry in a frame. IP datagram needs to fit into the link layer payload. If the MTU over a network is smaller, the “router” receiving the datagram will fragment the datagram.

Fragmentation/Reassembly (cont) All fragments of same datagram contain a unique identifier -- in the Ident field. Fragments of a datagram are re- assembled at end-host. If fragments are missing, entire datagram discarded -- TCP/UDP cannot handle fragmented segments.

An Example Maximum Ethernet size = 1500, Maximum FDDI size = 4500 and maximum PPP size = 532. IP header bytes.

To Note.. 1.Each IP Datagram is an independent datagram that is transmitted over a series of physical networks. 2.Each IP datagram is re- encapsulated for every physical network it travels across.

Flag and Offset fields Flag has a bit called the M bit -- set to indicate that further fragments on their way. – Not set for the final fragment. Offset -- Indicates offset from original datagram. – In the previous example, offset for first fragment on PPP network = 0. –For the second fragment, offset = 512 and so on. A detail: Fragmentation to be done in 8 byte units of data -- Offset field counts only in units of 8 bytes. Assignment: Read code on Reassembly-- Implementation -- Important -- what are maps ? why are holes created ? how can they be filled ?

Next in Chapter 4... Addressing with IP Routing. Achieving scalability -- Global Internet. Sections and 4.3