Design Considerations & Emerging Standards.  Carrier Sense Multiple Access / Collision Detect.  Practical limit on 802.3 Nodes per collision domain.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

1 Wireless LAN --which standard to follow? Avirup Dasgupta IT Department, Jadavpur University. Guide: Utpal K. Ray 29 th June,2004
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Networks: Wireless LANs1 Wireless Local Area Networks.
1 15-May-15 S Ward Abingdon and Witney College Wireless CCNA Exploration Semester 3 Chapter 7.
University of Calgary – CPSC 441
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Wireless Local Area Networks By Edmund Gean August 2, 2000.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
CSC 450/550 Part 3: The Medium Access Control Sublayer.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Networks: Wireless LANs1 Wireless Local Area Networks.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
WLAN b a Johan Montelius
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Lecture #2 Chapter 14 Wireless LANs.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
CWNA Guide to Wireless LANs, Second Edition
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Mozafar Bag-Mohammadi University of Ilam
Universität Karlsruhe Institut für Telematik ECE 591
WLAN.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Topic : 4.0 WIRELESS TECHNOLOGIES.  Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. Wireless.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Chapter-7 Basic Wireless Concepts and Configuration.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Rehab AlFallaj.  Is any type of computer network that uses wireless data connections for connecting network nodes and sharing network resources.  So,
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Computer Engineering and Networks, College of Engineering, Majmaah University LAN TECHNOLOGIES Mohammed Saleem Bhat CEN-444 Networks Structure.
CCNA Exploration Semester 3 Chapter 7
Multiple Access Methods
Outline What is Wireless LAN Wireless Transmission Types
Wireless Technologies
Wireless LANs Wireless proliferating rapidly.
CS 457 – Lecture 7 Wireless Networks
WiFi Networks: IEEE b Wireless LANs
basics Richard Dunn CSE July 2, 2003.
Chapter 4 Ethernet Technology
WiFi Networks: IEEE b Wireless LANs
Multiple Access Methods
Presentation transcript:

Design Considerations & Emerging Standards

 Carrier Sense Multiple Access / Collision Detect.  Practical limit on Nodes per collision domain

 Listen before you talk.

All stations share (access) the common media.

 Each station must wait at least 9.6 microseconds between packets ◦ InterPacket Gap (IPG) ◦ Allows receiver to process packet ◦ Also allows everyone a chance to use the medium.

 The first station to detect a collision sends a 32 bit ‘Jam’ signal. ◦ All stations stop sending for at least 9.6 microseconds  The two stations that caused the collision then calculate a “Backoff Period” Before retrying.

 There are a certain number of availble values for the random backoff period.  Once networks get to about 30 devices, the backoff periods become congested.

 CSMA/CD  Send and Receive share the same bus Half Duplex Collision Domain

 Switches Required  Switches create 2 virtual bus’s per connection Collision Domain

 is Half Duplex ◦ Tx and Rx uses SAME space ◦ A radio can not Transmit and Receive Simultaneously. ◦ Therefore, Collision Detection is not an option.

 Waits for each frame to be ACKd  If ACK not received, Collusion Assumed ◦ Takes LONGER then CD. ◦ More devices -> More Collisions -> More Wait Time

 Back to the rules of Shared Media  Each section of air is Shared Media  Each Channel is a segment (at a certain point.)

 Radio Frequency  2.6 Ghz, 5.2 Ghz

 Knows no boundaries  Unprotected from outside signals  Distance Sensitive ◦ Law of Inverse Square  Regulated differently in each country.

 More power = More Distance. ◦ Sorta.

 LOTS of interference ◦ Devices operating in the 2.4 GHz range include:  Microwave ovens.  Bluetooth devices.  Baby monitors.  Cordless telephones.  Building Security Systems

 NO Overlap between Channels 1, 6, and 11.  All other channels, to bad!

 Relatively unused.  Less Interference.  More Available Channels  Shorter Wavelength = ½ theoretical coverage  Absorbed more readily by solid objects.

 Pros ◦ More Bandwidth ◦ More Channels ◦ Less Interference  Cons ◦ Less Coverage Area ◦ Lower Penetration The Drawbacks” of 5 Ghz actually HELP K-12

 Uses Different Frequency Hopping to pack more of the RF Space.  Therefore, the faster the network, the more “attack surface” for interference it has.

 a up to 54 Mbps in 5 Ghz Band  b up to 11 Mbps in 2.4 Ghz Band.  g up to 54 Mbps in 2.4 Ghz Band.  n up to 600 Mbps via MIMO ◦ Technically supported in 2.4 GHZ.  ac MultiGbps via MU-MIMO

 n ◦ 20 Mhz Channels X 3 Streams = 300 MB ◦ 40 Mhz Channels X 3 Streams = 600 MB  ac ◦ 80 Mhz Channels x 4 streams = 1.7 Gb ◦ 160 Mhz Channels X 8 Streams = 6.9 Gb  (No chipsets yet bond 160Mhz)

Room 106Room 108

 IEEE RTS/CTS mechanism helps to solve this problem only if the nodes are synchronized and packet sizes and data rates are the same for both the transmitting nodes. When a node hears an RTS from a neighboring node, but not the corresponding CTS, that node can deduce that it is an exposed node and is permitted to transmit to other neighboring nodes IEEE RTS/CTS

 Limit Association Rates  Try for uniform Device Radio Types

interference-when-things-go-bump-in-the- air

 Bluetooth hops across the 2.4 GHz 1,600 times a second,

 Interference – What’s already there?  Building Construction – Brick Walls?  Area to Cover  Type of service ◦ (VoIP/Wifi?)  Number of potential Clients  Total Bandwidth required

◦ 5 GHZ Devices ◦ n or ac ◦ One AP : Traditional classroom ◦ One AP : 30 Students 802.1x authentication on WiFi Limiting “casual” associations

 Dual Band Devices ◦ abgn ◦ List “preferred” devices with abgn support

 Probes – frames advertise the WLAN network  Beacons – frames locate the WLAN network of the client  Authentication – access and entry into the WLAN network  Association – set up of a link between the AP and WLAN client

 War Drivers: Scanning devices are used to discover and exploit networks.  Hackers (Crackers): Where the hacker understands the complexity of the system and exploits its weaknesses.  Employees: End users make changes to the security of the system leaving it vulnerable to intrusion.

 PAN  LAN  MAN  WAN