Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – 6.033 – Spring 2014.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Ethernet – CSMA/CD Review
Both RTS and CTS contains: The address of the sender The address of the receiver The sizeof the intended data short message size contention concentrated.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
1 Introduction to Wireless Networks Michalis Faloutsos.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
MACAW: Wireless MACs Brad Karp UCL Computer Science CS 4038 / GZ06 18 th January, 2008.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
Recitation 8 Wireless Networks.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
Universität Karlsruhe Institut für Telematik ECE 591
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
WLAN.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Wireless Media Access Protocols Hari Balakrishnan LCS and EECS Massachusetts Institute of Technology
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
Communication Networks: Technology & Protocols
CS 457 – Lecture 7 Wireless Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
The Medium Access Control Sublayer
Wireless LAN Protocols
Chapter 6 Multiple Radio Access.
Presentation transcript:

Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014

Wireless Computer Networks Wireless LANs An Access Point (AP) which forwards packets to/from client nodes One hop Muti-hop Wireless Networks Stationary/Mobile nodes Nodes route packets for each other A multi-hop network

Wireless Transmission Sender has a radio range: Only nodes within radio range can hear transmission E.g., B hears A’s transmission but C doesn’t hear A If nearby nodes transmit simultaneously  collision AB C AB Radio cannot transmit and receive simultaneously  Use the lack of ack to detect collision

4 Higher Frequency Wi-Fi FCC Spectrum Allocation

Carrier Sense Multiple Access (CSMA) How it works (simplified) 1.listen before transmitting to ensure the medium is idle 2.When the medium becomes idle, pick a random slot out of 32 possible slots and transmit 3.If the receiver does not ack the packet, back off for a short random interval and retransmit 4.Repeat steps 1-3 until receiver acks packet, or we exceed the number of retrials, and every time double the backoff interval

Hidden Terminal Problem Nodes are little less than a radio range apart CSMA: Node listen to determine medium is idle before transmitting But, C can’t hear A. So it will transmit while A is transmitting; COLLISION at B. CSMA is insufficient to detect all transmissions on the wireless medium The problem: collisions happen at the receiver, but carrier sense is performed by the sender AB C Problem with CSMA

Exposed Terminal Problem B wants to deliver a packet to A C’s transmission would not cause collision at A, but C will refuse to transmit while B is transmitting to A Exposed terminal reduces efficiency Problem is caused by: collisions happen at the receiver, but carrier-sense is performed by the sender ABC Problem with CSMA

RTS (request to send) and CTS (clear to send) How does RTS-CTS work? Node that hears the RTS defers until the transmission of the CTS Node that hears the CTS defers until the transmission of data Solves the hidden terminal problem [why?] Solves the exposed terminal problem [why?] RTS and CTS can still collide at their receivers but is less likely since they are shorter ABC 1. “RTS, k bits” 3. “DATA” 2. “CTS, k bits” 2. defers

Bit Rate Capacity = BW log (Signal Power at Rx/Noise) Transmission bit rate has to be less than capacity otherwise receiver can’t decode How to pick the bit rate? has a few options for bit rates (e.g., 6 Mb/s, 9 Mb/s, …, 54Mb/s) Transmitter tries different bit rates and picks the bit rate that achieves the highest throughput (after accounting for packet loss)

Summary Carrier Sense Multiple Access (CSMA) Hidden terminal Exposed terminal RTS and CTS Bit rates Video Demo