Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained.

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

BLUETOOTH TM :A new radio interface providing ubiquitous connectivity Jaap C.Haartsen Ericssion Radio System B.V IEEE.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Multiple access What if multiple machines are sharing the same link?
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani Free University of Bozen-Bolzano Lesson 1 – Local network.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
CSC 450/550 Part 3: The Medium Access Control Sublayer.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
Bluetooth Radio Basics
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
Chapter 5 outline 5.1 Introduction and services
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Data Comm. & Networks Instructor: Ibrahim Tariq Lecture 3.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Distributed Topology Construction of Bluetooth Personal Area Networks Theodoros Salonidis, Pravin Bhagwat, Leandros Tassiulas and Richard LaMaire.
Bluetooth Address or Name Sharing By Joseph Charboneau.
A Bluetooth Scatternet-Route Structure for Multihop Ad Hoc Networks Yong Liu, Myung J. Lee, and Tarek N. Saadawi 2003 IEEE Journal on Selected Areas in.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
BLUETOOTH WIRELESS TECHNOLOGY
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
2. Data Link Layer: Medium Access Control. Scheduling.
Multiple Access Methods
SSN College of Engineering
Outline What is Wireless LAN Wireless Transmission Types
IT351: Mobile & Wireless Computing
Chapter 5 Link Layer and LANs
Part III Datalink Layer 10.
A Wireless LAN technologies IEEE
Channel Allocation (MAC)
Bluetooth, RFID, Data Link Layer Switching
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
BLUETOOTH (I) Bluetooth technology aims at so-called ad hoc piconets, which are local area networks with a very limited coverage and without the need for.
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Mobile Communications Chapter 3 : Media Access
Multiple Access Methods
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Multiple Access Methods
Dr. John P. Abraham Professor UTPA
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained Wireless Typically broadcasted Interference not only from other hosts, but other devices/physical world phenomenon Power constrained

Adhoc vs. Wireless LANs Adhoc Peer-to-peer networking Short range (10s of meters) One device in multiple networks Little supervision/management Wireless LANs Substitute for wired LANs Longer range (100s of meters) Typically connected to a wired backplane Device typically in only 1 network. Needs management

Bluetooth: A Case Study for Adhoc Networks From J. Haartsen, The Bluetooth Radio System. IEEE Personal Communications, Feb 200.

Overview Wireless personal area adhoc networking Uses 2.45 GHz spectrum (open to public) Several miniature networks (called Piconets) can co-exist. A host can reside in multiple piconets Each piconet channel has 1 master and up to 7 slaves Unreliable (and shared) medium Limited power

Multiplexing the bandwidth If you do not reserve the slots when someone should transmit, then there would be a lot of collisions/contention. How do you allocate the slots to different hosts? In the 2.45 GHz range, we are allowed MHz, and we need to find out what frequency to use at each instance of time. Bluetooth uses 79 frequencies at 1 MHz spacing.

The Multiplexing Problem frequency (how to divide resource among multiple channels?) time

Frequency-Division Multiplexing time frequency user 1 user 2 user 3 user 4 guard-band

Time Division Multiplexing time frequency user 1user 2user 3user 4 guard-band user 1user 2

Frequency-Time Division Multiplexing time frequency time-slot (usually of the same size)

Bluetooth uses frequency-time multiplexing (frequency hopping) You do not want to perform multiplexing statically (since you do not know what hosts are present, and who will transmit) Dynamically determine multiplexing. However, if everything is dynamic then we need an extensive protocol to figure our who transmits when Bluetooth uses a frequency hopping pattern wherein the identity of the master is used to determine the (sequence of) frequencies that should be used at each time slot.

Frequency Hopping Use a well defined hopping pattern sequence for each piconet.

Hop Selection Logic Master identity chooses sequence Clock chooses index (phase) in sequence Offset established at connection time

Connection Establishment How do units find each other and establish connections? No common control unit! A unit wakes up to listen (scan) for its id for around 10 ms. Wake up hop sequence is 32 hops (cyclic) and unique for each device. The burden is on paging unit to ensure the appropriate unit is woken up.

It knows id of dest, and its wakeup 32 hop (unique) sequence It transmits the dest id repeatedly at different frequencies in the sequence every 1.25 ms (2*625us) It transmits two dest id codes and listens twice for a response.

Polling Device In 10ms (sleep period) 16 frequencies visited (half sequence) If polling device does not receive response after the “sleep period”, will repeat on the hop carriers of the remaining 16 in the sequence. Maximum delay is thus twice the sleeping period When dest. receives page, it returns back a msg with its identity. Paging unit then sends the dest its identity and clock, and the two now establish a piconet (pager becomes master, and dest a slave).

Medium Access A piconet channel is defined by id and system clock of Master All other units are slaves When a piconet is established, slaves add offset to their native clocks to sync with Master Different channels have different Masters (and different hopping patterns) Wired solutions for media access control (e.g. CSMA) do not suffice.

The Hidden Terminal Problem BAC A sends to B, C cannot receive A C wants to send to B If use CSMA/CD: C senses a “free” medium, thus C sends to A Collision at B, but A cannot detect the collision Therefore, A is “hidden” for C

The Exposed Terminal Problem BAC B sends to A, C wants to send to D If use CSMA/CD C senses an “in-use” medium, thus C waits But A is outside the radio range of C, therefore waiting is not necessary Therefore, C is “exposed” to B D

Master completely controls access control, making access contention free. Time slots are alternately used for Master and Slave transmissions. The master decides for each slave->master slot which slave should get it. Only the slave addressed in the preceding master- >slave slot is allowed to transmit in this slave- >master slot. If the master has no information to send, it has to poll the slave explicitly with a short poll packet.

Master-controlled Media Access

Packet Structure (in bits)

Acks/Retransmissions A bit in header is used to indicate whether previous packet was received correctly (or if a re-transmission is needed)