CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts
|
|
- Emil Weaver
- 5 years ago
- Views:
Transcription
1 1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University November 29, 200 Wireless and Mobile Networks Background Number of wireless (mobile) phone subscribers now exceeds number wired phone subscribers! Computer s» laptops, palmtops, PDAs, Internet-enabled phone promise anytime un-tethered Internet access Two important (but different) challenges: 1. communication over wireless link 2. handling mobile user who changes point of attachment to 2 Wireless and Mobile Networks Roadmap Wireless Hosts Introduction Wireless links, characteristics» CDMA IEEE wireless LANs ( wi-fi ) Mobility Principles: addressing and routing to mobile users Mobile IP Mobility and higher-layer protocols infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile» wireless does not always mean mobility 3
2 5 Base Station Wireless Link infrastructure base station typically connected to wired relay - responsible for sending packets between wired and wireless host(s) in its area» e.g., cell towers access points infrastructure wireless link typically used to connect mobile(s) to base station also used as backbone link multiple access protocol coordinates link access various data rates, transmission distance 6 Characteristics of selected wireless link standards Infrastructure Mode 5 Mbps 5-11 Mbps 1 Mbps 38 Kbps 56 Kbps {a,g} b UMTS/WCDMA, CDMA2000 IS-95 CDMA, GSM.11 p-to-p link 3G 2G infrastructure infrastructure mode base station connects mobiles into wired handoff: mobile changes base station providing connection into wired Indoor Outdoor Mid range outdoor Long range outdoor 10 30m m 200m Km 5Km 20Km 7 8
3 9 Ad-hoc Mode Wireless Link Characteristics Ad hoc mode no base stations nodes can only transmit to other nodes within link coverage nodes organize themselves into a : route among themselves Differences from wired link.» decreased signal strength radio signal attenuates as it propagates through matter (path loss)» interference from other sources standardized wireless frequencies (e.g., 2. GHz) shared by other devices (e.g., phone); devices (motors) interfere as well» multipath propagation radio signal reflects off objects ground, arriving ad destination at slightly different times. make communication across (even a point to point) wireless link much more difficult 10 Characteristics Multiple wireless senders and receivers create additional problems (beyond multiple access): A Hidden terminal problem B, A hear each other B, C hear each other A, C can not hear each other means A, C unaware of their interference at B C B A B C A s signal strength space C s signal strength Signal fading: B, A hear each other B, C hear each other A, C can not hear each other interfering at B Code Division Multiple Access (CDMA) Used in several wireless broadcast channels (cellular, satellite, etc) standards Unique code assigned to each user» code set partitioning All users share same frequency, but each user has own chipping sequence (i.e., code) to encode data Encoded signal = (original data) X (chipping sequence) Decoding: inner-product of encoded signal and chipping sequence Allows multiple users to coexist and transmit simultaneously with minimal interference (if codes are orthogonal ) 11 12
4 13 Wireless and Mobile Networks Roadmap IEEE Wireless LAN Introduction Wireless links, characteristics» CDMA IEEE wireless LANs ( wi-fi ) Mobility Principles: addressing and routing to mobile users Mobile IP Mobility and higher-layer protocols b» 2.-5 GHz unlicensed radio spectrum» up to 11 Mbps» direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code» widely deployed, using base stations a» 5-6 GHz range» up to 5 Mbps g» 2.-5 GHz range» up to 5 Mbps All use CSMA/CA for multiple access All have base-station and ad-hoc versions 1 IEEE LAN Architecture IEEE Channels, Association BSS 1 AP Internet hub, switch or router AP Wireless host communicates with base station» base station = access point (AP) Basic Service Set (BSS) (aka cell ) in infrastructure mode contains:» wireless hosts» access point (AP): base station» ad hoc mode: hosts only b: 2.GHz-2.85GHz spectrum divided into 11 channels at different frequencies» AP admin chooses frequency for AP» interference possible: channel can be same as that chosen by neighboring AP! Host: must associate with an AP» scans channels, listening for beacon frames containing AP s name (SSID) and MAC address» selects AP to associate with» may perform authentication» will typically run DHCP to get IP address in AP s subnet BSS
5 17 IEEE Multiple Access IEEE MAC Protocol CSMA/CA Avoid collisions: 2 + nodes transmitting at same time : CSMA - sense before transmitting» don t collide with ongoing transmission by other node : no collision detection!» difficult to receive (sense collisions) when transmitting due to weak received signals (fading)» can t sense all collisions in any case: hidden terminal, fading» goal: avoid collisions: CSMA/C(ollision)A(voidance) A C B A B C A s signal strength C s signal strength Sender If sense channel idle for DIFS then» transmit entire frame (no CD) If sense channel busy then» start random backoff time» timer counts down while channel idle» transmit when timer expires» if no ACK, increase random backoff interval, repeat 2 Receiver if frame received OK» return ACK after SIFS (ACK needed due to hidden terminal problem) DIFS sender data ACK receiver SIFS space 18 IEEE MAC Protocol Avoiding Collisions Collision Avoidance RTS-CTS exchange Idea: allow sender to reserve channel rather than random access of data frames: avoid collisions of long data frames Sender first transmits small request-to-send (RTS) packets to BS using CSMA» RTSs may still collide with each other (but they re short) BS broadcasts clear-to-send CTS in response to RTS RTS heard by all nodes» sender transmits data frame» other stations defer transmissions A RTS(A) RTS(A) CTS(A) DATA (A) AP reservation collision CTS(A) B RTS(B) defer Avoid data frame collisions completely using small reservation packets! time ACK(A) ACK(A) 19 20
6 21 IEEE Frame Addressing IEEE Frame Addressing frame duration address address control 1 2 address 3 seq control address payload CRC H1 R1 router Internet Address 1: MAC address of wireless host or AP to receive this frame Address 2: MAC address of wireless host or AP transmitting this frame Address 3: MAC address of router interface to which AP is attached Address : used only in ad hoc mode AP R1 MAC addr AP MAC addr dest. address source address frame AP MAC addr H1 MAC addr R1 MAC addr address 1 address 2 address frame 22 IEEE Frame IEEE Mobility Within Same Subnet frame duration address address control 1 2 Protocol version Type duration of reserved transmission time (RTS/CTS) Subtype To AP address 3 From AP seq control More frag frame seq # (for reliable ARQ) address 1 1 Power Retry mgt payload More data WEP CRC Rsvd H1 remains in same IP subnet: IP address can remain same Switch: which AP is associated with H1?» self-learning: switch will see frame from H1 and remember which switch port can be used to reach H1 BBS 1 AP 1 router hub or switch AP 2 H1 BBS 2 frame type (RTS, CTS, ACK, data) 23 2
7 25 IEEE Personal Area Network Wireless and Mobile Networks Roadmap Less than 10 m diameter Replacement for cables (mouse, keyboard, headphones) Ad-hoc: no infrastructure Master/slaves:» slaves request permission to send (to master)» master grants requests : evolved from Bluetooth specification» GHz radio band» up to 721 kbps S S P M P S P M Master device S Slave device radius of coverage P Introduction Wireless links, characteristics» CDMA IEEE wireless LANs ( wi-fi ) Mobility Principles: addressing and routing to mobile users Mobile IP Mobility and higher-layer protocols P Parked device (inactive) 26 What is Mobility? Mobility Vocabulary Spectrum of mobility, from the perspective: no mobility high mobility home : permanent home of mobile (e.g., /2) home agent: entity that will perform mobility functions on behalf of mobile, when mobile is remote mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user, passing through multiple access point while maintaining ongoing connections (like cell phone) Permanent address: address in home, can always be used to reach mobile e.g., wide area 27 28
8 29 Mobility More Vocabulary Mobility How do you contact a mobile friend? Permanent address: remains constant (e.g., ) Care-of-address: address in visited. (e.g., 79, ) wide area visited : in which mobile currently resides (e.g., /2) Consider friend frequently changing addresses, how do you find her? search all phone books? call her parents? expect her to let you know where he/she is? I wonder where Alice moved to? : wants to communicate with mobile home agent: entity in visited that performs mobility functions on behalf of mobile. 30 Mobility Approaches Let routing handle it:» routers advertise permanent address of mobile-nodesin-residence via usual routing table exchange.» routing tables indicate where each mobile located» no changes to end-systems Let end-systems handle it:» indirect routing: communication from to mobile goes through home agent, then forwarded to remote» direct routing: gets foreign address of mobile, sends directly to mobile Mobility Approaches Let routing handle it:» routers advertise permanent address of mobile-nodesin-residence via usual routing table exchange. not scalable» routing tables indicate where each mobile located to millions of» no changes to end-systems mobiles Let end-systems handle it:» indirect routing: communication from to mobile goes through home agent, then forwarded to remote» direct routing: gets foreign address of mobile, sends directly to mobile 31 32
9 33 Mobility Registration End result: home 2 wide area foreign agent contacts home agent home: this mobile is resident in my Foreign agent knows about mobile Home agent knows location of mobile visited 1 mobile contacts foreign agent on entering visited Mobility via Indirect Routing home addresses packets using home address of mobile home agent intercepts packets, forwards to foreign agent 1 wide area 2 foreign agent receives packets, forwards to mobile 3 visited mobile replies directly to 3 Indirect Routing Comments Mobile uses two addresses:» permanent address: used by (hence mobile location is transparent to )» care-of-address: used by home agent to forward datagrams to mobile Foreign agent functions may be done by mobile itself Triangle routing» -home--mobile» inefficient when, mobile are in same Indirect Routing Moving Between Networks Suppose mobile user moves to another» registers with new foreign agent» new foreign agent registers with home agent» home agent update care-of-address for mobile» packets continue to be forwarded to mobile (but with new care-of-address) Mobility, changing foreign s transparent: on going connections can be maintained! 35 36
10 37 Mobility via Direct Routing Mobility via Direct Routing home forwards to foreign agent foreign agent receives packets, forwards to mobile visited Overcome triangle routing problem Non-transparent to : must get care-of-address from home agent» what if mobile changes visited? 2 wide area 3 requests, receives foreign address of mobile 1 mobile replies directly to 38 Accommodating Mobility with Direct Routing Wireless and Mobile Networks Roadmap Anchor foreign agent: FA in first visited Data always routed first to anchor FA When mobile moves: new FA arranges to have data forwarded from old FA (chaining) Introduction Wireless links, characteristics» CDMA Mobility Principles: addressing and routing to mobile users Mobile IP wide area 1 anchor foreign agent foreign net visited at session start 2 IEEE wireless LANs ( wi-fi ) Mobility and higher-layer protocols agent 5 new foreign agent 3 new foreign 39 0
11 1 Mobile IP RFC 3220 Has many features we ve seen:» home agents, foreign agents, foreign-agent registration, care-ofaddresses, encapsulation (packet-within-a-packet) Three components to standard:» indirect routing of datagrams» agent discovery» registration with home agent Mobile IP Indirect Routing packet sent by home agent to foreign agent: a packet within a packet dest: dest: Permanent address: dest: packet sent by foreign-agent-to-mobile packet dest: Care-of address: Mobile IP Agent Discovery Mobile IP Registration Example agent advertisement: foreign/home agents advertise service by broadcasting ICMP messages (typefield = 9) H,F bits: home and/or foreign agent R bit: registration required type = 9 code = 0 = 9 type = 16 registration lifetime router address checksum = 9 length sequence # RBHFMGV bits 0 or more care-ofaddresses reserved standard ICMP fields mobility agent advertisement extension home agent HA: time foreign agent COA: registration req. COA: HA: MA: Lifetime: 9999 identification: 71 encapsulation format. registration reply HA: MA: Lifetime: 999 Identification: 71 encapsulation format. visited : /2 ICMP agent adv. Mobile agent COA: MA: registration req. COA: HA: MA: Lifetime: 9999 identification:71. registration reply HA: MA: Lifetime: 999 Identification: 71. 3
12 5 Wireless and Mobility Impact on Higher Layer Protocols Logically, impact should be minimal» best effort service model remains unchanged» TCP and UDP can (and do) run over wireless, mobile but performance-wise:» packet loss/delay due to bit-errors (discarded packets, delays for link-layer retransmissions), and handoff» TCP interprets loss as congestion, will decrease congestion window unnecessarily» delay impairments for real-time traffic» limited bandwidth of wireless links
Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationCSCI-1680 Wireless Chen Avin
CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationModule 6: Wireless Mobile Networks
Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.
Chapter 6 Wireless and obile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Chapter 6: Wireless and obile Networks
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
More informationCS 332 Computer Networks Wireless Networks
CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationCSC 8560 Computer Networks: Wireless and Mobility
CSC 8560 Computer Networks: Wireless and Mobility Professor Henry Carter Fall 2017 Chapter 7: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers!
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network
Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Reading Guide: Chapter 6: 6.1 6.4 1 Ch. 6: Wireless and Mobile Networks Background: v # wireless (mobile) phone subscribers now exceeds # wired
More informationCSC 4900 Computer Networks: Mobility
CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping
More informationChapter 5 Wireless and Mobile Networks
Chapter 5 Wireless and Mobile Networks Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Wireless and Mobile Networks Chapter 5: Wireless
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in
More informationChapter 6 Wireless and Mobile Networks (Wireless and Mobility)
CSF645 Mobile Computing 行動計算 Chapter 6 Wireless and Mobile Networks (Wireless and Mobility) Computer Networking: A Top Down Approach 6 th edition, Jim Kurose, Keith Ross 吳俊興國立高雄大學資訊工程學系 outline 6.1 Introduction
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationLast time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling
Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationElements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network
wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected to wired relay - responsible for sending
More informationWireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationElements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network
Elements of a wireless Elements of a wireless wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach. Andrei Gurtov
Chapter 7 Wireless and Mobile Networks Andrei Gurtov All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationM06:Wireless and Mobile Networks. Corinna Schmitt
M06:Wireless and Mobile Networks Corinna Schmitt corinna.schmitt@unibas.ch Acknowledgement 2016 M06 2 Background q # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)!
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless
More informationComputer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the
Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationWireless and Mobile Networks
Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals # wireline Internet-connected
More informationNo lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after.
Administrivia No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after. 1 CSMA/CA: Recap Sensing in wireless medium is limited
More informationCommunication Networks: Wireless and Mobile Communication Networks. Prof. Amir Herzberg BIU, Dept. of CS
89-850 Communication Networks: Wireless and Mobile Communication Networks Prof. Amir Herzberg BIU, Dept. of CS From ch.6 of Kurose and Ross, 3 rd edition; and [KMK], ch. 8. All material copyright 1996-2004
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationChapter 3: Wireless and Mobile Networks
Computer Network Architectures and Multimedia Guy Leduc Chapter 3 Wireless and Mobile Networks Chapter 7 of Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationMobile devices for wireless
Mobile devices for wireless Wireless sensors Limited proc. power Small battery Laptop functionally eq. to desktop standard applications TDTS04/09 Föreläsning 0/6: WLAN och TCP i trådlösa nät RFID tag A
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationAnnouncements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday
ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationAlready finished all layers in the stack, why a separate chapter for wireless and mobile networks?
Wireless and Mobile Networks Yanmin Zhu Department of Computer Science and Engineering Mobile lobal ISP Home Regional ISP Institutional Already finished all layers in the stack, why a separate chapter
More informationLecture 15 Wireless and Mobility
Lecture 15 Wireless and Mobility From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright 1996-2016 J.F Kurose and K.W. Ross,
More informationLink Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link Virtualization:
More informationHome Area Networks. Outline
Home Area Networks CS 687 University of Kentucky Fall 2015 Acknowledgment: Some slides are adapted from the slides distributed with the book Computer Networking: A Top Down Approach, 5th edition. Jim Kurose,
More informationChapter 7. Wireless and Mobile Networks 7-1
Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationExtending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.
Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just
More informationMedium Access Control
Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: The notes used in this course are substantially based on powerpoint slides developed and copyrighted by J.F. Kurose and K.W.
More informationMobility: vocabulary
What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,
More information3/20/2012. Data Communications & Networks. Session 5 Main Theme. 2 Wireless and Mobile Networks. Dr. Jean-Claude Franchitti
Data Communications & Networks Session 5 Main Theme Wireless and Mobile Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationWireless Security Background
Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationECS-087: Mobile Computing
ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationWireless Network and Mobility
Wireless Network and Mobility Dept. of Computer Science, University of Rochester 2008-11-17 CSC 257/457 - Fall 2008 1 Wireless Networks and Mobility Wireless networking in the data link layer Short range:
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationReti degli elaboratori
Reti degli elaboratori Dealing with Mobility; Bluetooth Basics Chiara Petrioli petrioli@di.uniroma1.it What is mobility? v spectrum of mobility, from the network perspective: no mobility high mobility
More informationWireless Internet Routing. Review of Wireless Networking (with Routing in Mind)
Wireless Internet Routing Review of Wireless Networking (with Routing in Mind) 1 Review of Wireless Networking Architecture of wireless networks Wireless PHY Wireless MAC o 802.11 PHY: physical layer /
More informationCS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.
CS118 Discussion 1A, Week 9 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Wireless: 802.11 Mobile IP Cellular Networks: LTE Sample final 2 Wireless and Mobile Network Wireless access: WIFI
More informationCOSC : mobility within same subnet. Lecture 26. H1 remains in same IP subnet: IP address can remain same
Lecture 26 802.11: mobility within same subnet H1 remains in same IP subnet: IP address can remain same switch: which AP is associated with H1? self learning (Ch. 5): switch will see frame from H1 and
More information(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind)
(Wireless) Internet Routing Review of Wireless Networking (with Routing in Mind) 1 Review of Wireless Networking Architecture of wireless networks Wireless PHY Wireless MAC o 802.11 PHY: physical layer
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack
Data Link Protocols TCP/IP Suite and OSI Reference Model The TCP/IP protocol stack does not define the lower layers of a complete protocol stack In this lecture, we will address how the TCP/IP protocol
More informationAnnouncements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7
ECE/CS 372 introduction to computer networks Announcements: Assignment 4 due now Chapter 7 Acknowledgement: slides drawn heavily from Kurose & Ross and Prof. Bechir Hamdaoui Chapter 7, slide 1 Wireless
More informationChapter 6. Wireless and Mobile Networks. IEEE : personal area network : WiMAX: downlink, uplink scheduling
Chapter 6 Wireless and Networks Part II IEEE 802.15: personal area less than 10 m diameter replacement for cables (mouse, keyboard, headphones) ad hoc: no infrastructure master/slaves: slaves request permission
More informationLast time?! MPLS! Label distribution protocols! Multi Protocol Label Switching! Layer 2.5 protocol! LDP! RSVP!
Part2: SDNs Last time? MPLS Multi Protocol Label Switching Layer 2.5 protocol Label distribution protocols LDP RSVP Per router control plane Individual routing algorithm components in each and every router
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationBlock 3: Lecture 1! Part 3: Lecture 1! Wireless networks!
Block 3: Lecture 1 Part 3: Lecture 1 Wireless networks Part 3 Wireless and mobile networks: 1. Wireless technologies 2. Mobility 3. Fiber day on Friday May 22nd Long time ago... Marconi invented the wireless
More informationInternet Services & Protocols. Mobile and Wireless Networks
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Mobile and Wireless Networks Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de
More informationAnnouncements: ECE/CS 372 introduction to computer networks. Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon
ECE/CS 372 introduction to computer networks Lecture 14 Announcements: Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon Credit for lecture slides to Professor Bechir Hamdaoui
More informationWhat is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks
Advanced Topics in Computer Networks What is mobility? spectrum of mobility, from the perspective: Mobile IP no mobility high mobility Chalermek Intanagonwiwat Slides courtesy of James F. Kurose, Keith
More informationCSC 498R: Internet of Things 2
CSC 498R: Internet of Things Lecture 04: Wireless Networks Instructor: Haidar M. Harmanani IoT Components Things we connect: Hardware, sensors and actuators Connectivity Medium we use to connect things
More informationChapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees
Chapter 4 roadmap 4. Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What s Inside a Router 4.4 The Internet (IP) Protocol 4.5 Routing Algorithms 4.6 Routing in the Internet 4.7
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationWireless Networks. Wireless Links. Mike Freedman hap:// Interference / bit errors
1! Widespread Deployment 2! Wireless Networks COS 461: Computer Networks Spring 2013 Mike Freedman hap://www.cs.princeton.edu/courses/archive/spring13/cos461/ Worldwide cellular subscribers 1993: 34 million
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationChapter 5: The Data Link Layer
Chapter 5: The Data Link Layer Our goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing reliable
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling
More informationCarrier Wave! Signals! Modulation! Internet Protocol Stack!
Internet Protocol Stack! Carrier Wave! application: supporting network applications!! HTTP, SMTP, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams from source
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless
Wireless Challenges 15-441: Computer Networking Lecture 24: Mobile and Wireless Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 Force us to rethink many assumptions Need to share airwaves rather
More information