Data Link Layer. Today s News. Data Link Layer. Node Configuration

Size: px
Start display at page:

Download "Data Link Layer. Today s News. Data Link Layer. Node Configuration"

Transcription

1 Today s News Topics Comm., Networks, Architecture, Protocol(Sept. 4) PD: 1.3 Multiplexing, Queueing (Sept. 6, Sept. 11) PD: 1.2, 1.5 Layer 2 Data Link (Sept. 11 supp.) PD: 2.1 Socket programming HW description (TA) Error control (Sept. 13, Sept. 18) PD: 2.5 First Quiz is on Sept. 18 May bring one A4 sized reference note Should be original & handwritten Post prior year s Quiz, exams on the homepage Data Link Layer Chong-kwon Kim SNU SCONE lab. 1 Data Link Layer Data link layer is concerned with direct link networks Two nodes directly connected by a single point-topoint link Node Configuration Network adapter connects to I/O bus & network link Device driver manages a network adapter Manage message passes between main memory and network adapter buffer CPU A broadcast link segment with multiple attachments Cache Network Adapter (To network) Different names at different layers Frame: L2 Packet, Datagram: L3 Segment: L4 Message: L7 SNU SCONE lab. Memory I/O bus Example OpenWRT: An embedded kernel for WLAN AP ath9k: Device driver for Atheros WiFi chipsets SNU SCONE lab.

2 Data Link Layer Functions Framing Error control Flow control Medium access control (MAC) LAN Standard protocols HDLC (High-level Data Link Control) - ISO LAPB (Link Access Protocol Balanced) - ITU LLC (Logical Link Control) - IEEE Type 1, 2, 3 Error Control Chong-kwon Kim SNU SCONE lab. Error Control First, detect error occurrences and then ensure correct transmission Error types & detection methods Bit error Error detection code such as CRC Lost or duplicated frames Use sequence numbers (SN) that uniquely identify frames Principle A sender retransmits a frame repeatedly until it assures that correct one is transferred Two methods Positive Acknowledgement (ACK) + Automatic retransmission based on Timeout (TO) Retransmission based on Negative Acknowledgement (NAK) SNU SCONE lab. 7 ACK + Automatic Retransmission Basic action Sender Receiver ACK Automatic Retransmission based on TO Sender Receiver x TO 1 What happens if packet / ACK is erred / lost? SNU SCONE lab. 8

3 ACK + Automatic Retransmission Sender Receiver 1 TO x 1 The ACK is lost and the receiver receives the same frame What would you do? 1. Do nothing The sender will retransmit the same frame infinitely 2. Resend the ACK ACK + Automatic Retransmission Sender Receiver TO The frame #2 is lost, but two ACKs are received Should distinguish ACKs Use Request Number (RN) RN specifies the next packet expecting instead of the last correctly received packet x Sender TO SNU SCONE lab. 9 Receiver 2 2 x 10 NAK Based Method Sender Receiver x 1 ARQ (Automatic Repeat request) Stop-and-wait ARQ Continuous ARQ Go-back-N ARQ Selective-repeat ARQ When to send NAKs? Receive corrupted frames How do you know that a corrupted frame is the frame? Receive out of order frames Error control is triggered by following frames What if there is a long gap between frames? What if there is no next frame? Lost NAK NAK is used only as a supplementary mechanism SNU SCONE lab. 11 SNU SCONE lab. 12

4 Today s News Topics Layer 2 Data Link (Sept. 11 supp.) PD: 2.1 HW description (TA) Error control (Sept. 13) PD: 2.5 Socket programming (TA) MAC (Sept. 18, Sept. 18 Supp.) PD: 2.6 WLAN (Sept. 29, Oct. 6) PD: 2.7 First Quiz is on Sept. 18 May bring one A4 sized reference note Should be original & handwritten Post prior year s Quiz, exams on the homepage (Slightly) revised class note will be post by tomorrow Stop & Wait ARQ Chong-Kwon Kim SNU SCONE lab. 13 Stop & Wait ARQ - 1 Stop and Wait Send a single packet(frame) and stop & wait for an Ack. Stop & Wait ARQ - 2 Sender Algorithm Step 0: Set SN = 0 Step 1: Transmit a frame, Set the timer, Wait for ACK with right RN Step 2: One of two events occurs A: If receive right ACK before TO, Set SN (SN+1) mod 2, Goto Step 1 B: If TO, Goto Step 1 to retransmit Receiver Algorithm 15 Step 0: Set RN = 0 Step 1: Wait for a frame Step 2: Packet arrives A: If errorless & SN = RN, Accept the frame, RN (RN+1) mod 2, Send ACK B: Discard the frame, Retransmit ACK

5 Stop & Wait ARQ - Example Three Army Problem SN TO Two Generals Problem (Byzantine Generals Problem ) RN State SN represents the sender s state RN represents the receiver s state Combined state = (SN, RN) State transitions (0, 0) -> (0, 1) -> (1, 1) -> (1, 0) -> (0, 0) (0, 0) -> (0, 1), (1, 1) -> (1, 0) : Receiver knows the combined state (0, 1) -> (1, 1), (1, 0) -> (0, 0): Sender knows the combined state Sender & Receiver do not knows the combined state simultaneously SNU SCONE lab. Utilization (Efficiency) of Stop & Wait Propagation time : time taken for signal to travel from S to R. Thus first bit transmitted at t=0 arrives at R at t=t p =d/v Transmission time : time taken to emit all bits of frame at sender=t t =L/B 19 SNU SCONE lab. 20

6 Derive Utilization using the Little s Theorem With stop & wait scheme, for high channel utilization, we need a low α (since U=1/(1+2 α )) Go-Back-N ARQ In practice, it is not desirable to increase length L indefinitely Error probability increases with L Starvation/high avg. delay with multipoint lines Realtime applications short packet assembly time A more efficient scheme is called for, especially with HSN/WAN/satellite communication Chong-Kwon Kim 21 Go-Back-N Send multiple packets without receiving ACKs N: Window size Maximum number of unacked packets that can be sent Stop and Wait is a special case of Go-back-N Window: Packets that have been sent (but unacked) + that can be sent Window size = N MinSN: First packet that are not ACKed yet MaxSN: Highest packet that can be sent MaxSN = MinSN+N-1 SN: Next packet to be sent Example: N=8, MinSN = Go-Back-N Algorithm Sender algorithm Step 0: Set MinSN = SN = 0, MaxSN = MinSN+N-1, Send a frame, Set the timer Step 1: Do one of three events forever A: If SN < MaxSN, Set SN SN+1, Transmit the next frame, (Set the timer) B: If ACK with RN > MinSN arrives, Set MinSN RN, MaxSN MinSN+N-1 C: If TO, Retransmit (Which frames?) Receiver algorithm Step 0: Set RN = 0 Step 1: Receive frames forever A: If the frame is error-free and RN = SN, Accept the frame, RN RN+1, Transmit ACK B: O.W., Retransmit ACK Sent but not Acked yet SNU SCONE lab.

7 Quiz Solutions Quiz Solutions Suppose users share a 2 Mbps link. Also suppose each user transmits continuously at 1 Mbps when active, but each user is active only 20% of the time. a. When FDM (or Synchronous TDM) is used, how many users can be supported? (Ignore framing or guard band overheads) b. Suppose we use synchronous TDM. A framing bit alternates 0 and 1. The receiver picks one position and regards the position is the framing bit if 0/1 bit alternates N times continuously. Given that 0 and 1 bits in user data appear randomly and in equal probability, compute the probability that the receive makes a wrong decision. c. Assume that user data is packetized into 11Kbits long packets. Each packet consists of 10 Kbit paylord and 1 Kbit header. How many packets does each user generate per second? Also compute the transmit time of each packet. d. Suppose that the link is shared by three users based on statistical (asynchronous) TDM. Compute the delay including the transmit time assuming the M/M/1 queueing. (Note that the system cannot be analyzed via M/M/1 system since the service time is not Exponential, but Deterministic) SNU SCONE lab. 25 SNU SCONE lab. 26 Quiz Solutions Today s News Topics Layer 2 Data Link (Sept. 11 supp.) PD: 2.1 Error control (Sept. 13, Sept. 18) PD: 2.5 MAC (Sept. 18 Supp, Sept. 20) PD: 2.6 WLAN (Sept. 25, Sept 25 Supp) PD: 2.7 Supplement class at 7:00 PM today SNU SCONE lab. 27 SNU SCONE lab. 28

8 Go-Back-N Example (N=4 case) [0, 3] [1, 4] [2, 5] SN TO ACK Semantics Cumulative ACK Compare to Point ACK ACK (RN) acknowledges packets up to (RN-1) Lost ACKs may be recovered RN Properties of Go-Back-N Properly designed, Go-Back-N achieves 100% utilization Right size of N? In case of a single packet loss/error Retransmit packets [MinSN, SN] How about an ACK loss/error? How about out-of-sequence packets? SNU SCONE lab. [0, 3] [2, 5] [4, 7] [5, 8] SN TO RN SNU SCONE lab. Link Utilization of Go-Back-N Utilization : U is a function of a and N Case 1 : N > 1 + 2a Frame 1 ACK reaches to the sender before transmission of N th frame continuous transmission possible Case 2 : N < 1 + 2a : U = N / (1+2a) Wasted time between N and 1 + 2a SNU SCONE lab. 31 SNU SCONE lab. 32

9 YA ARQ: Selective Repeat Survey the Internet and learn Selective Repeat ARQ Medium Access Control Basic & ALOHA Chong-kwon Kim SNU SCONE lab. 33 Taxonomy of Medium Access Methods MAC protocols can be considered as distributed ATDM Contention Based Contention Based Method Every station is a peer No master-slave relation Fully distributed, non-coordination method Judge & behave based on locally available information Stations use care not to interfere other But should be aggressive to earn the fair share Collisions still can occur CSMA/CD Aloha CSMA CSMA/CA SNU SCONE lab. 35 SNU SCONE lab. 36

10 ALOHA - 1 Proposed by Abramson in 1970 Implemented and used at the Univ. of Hawaii U. Hawaii campuses ALOHA - 2 Transmit a frame and check if the frame is transmitted correctly ACK Retransmit in case of no ACK Example SNU SCONE lab. 37 SNU SCONE lab. 38 Today s News Topics Layer 2 Data Link (Sept. 11 supp.) PD: 2.1 Error control (Sept. 13, Sept. 18) PD: 2.5 MAC (Sept. 18 Supp) PD: 2.6 WLAN (Sept. 20, Sept 25) PD: 2.7 Selected problems will be posted on the class homepage tomorrow ALOHA Performance Analysis Tfr = 1(unit time) A is successful if No attempt in (t-1, t) && (t, t+1) n stations each with p attempt rate Total attempt rate = n p A frame sent at time t is successful if only one attempt in (t, t+1) and no attempt in (t-1, t) Binomial distribution, Bin(x; n, p) = ncx 1 P(success) = b(1; n, p) b(0; n, p) = nc1 1 nc0 1 = 1 SNU SCONE lab. 39 SNU SCONE lab. 40

11 ALOHA Performance Analysis Note b(x; n, p) Po(x; G) where G = n p if n is large and p is small The throughput for pure ALOHA is S = G e 2G. The maximum throughput S max = when G = (1/2) ALOHA - 3 Procedure What happens if G=n p is too small OR too large? SNU SCONE lab. 41 SNU SCONE lab. 42 Problem of ALOHA Problem with Pure (Unslotted) Aloha An attempt may be interfered by later attempts Vulnerable time is long Slotted ALOHA & CSMA Chong-kwon Kim SNU SCONE lab. 44

12 Slotted Aloha - 1 Solution Synchronize the transmissions How to synchronize stations? (know the beginning of slots) Slotted Aloha - 2 A station that has a packet to send, waits until the next slot Success Idle Idle Collision Time A slot is either Idle, Success or Collision Idle: No arrival during the previous slot time Success: Exactly one arrival Collision: More than one arrival SNU SCONE lab. 45 SNU SCONE lab. 46 Slotted Aloha Performance Analysis A slot is successful if There is exactly one attempt during the previous slot Pr(1 arrival in a unit time) = G e -G Slotted Aloha - Problem Slotted Aloha is unrealistic Synchronization is a big problem One solution is to have a control node and the node transmits beacons that announce the beginning of slots Or adopt NTP (Network Time Protocol) A centralized controller brings out other problems The throughput for slotted ALOHA is S = G e G. The maximum throughput S max = when G = 1 SNU SCONE lab. 47 SNU SCONE lab. 48

13 CSMA (Carrier Sense Multiple Access) - 1 Success Idle Idle Collision Time Two problems of slotted Aloha Long Idle slot Long Collision slot How to shorten the Idle slot? Pure Aloha blindly accesses the medium even though there are ongoing transmissions On the other hand, slotted Aloha blindly postpones transmission even though the medium is idle Check the medium and transmit frames immediately if the medium is idle, not waiting until the next slot Carrier sensing SNU SCONE lab. 49 CSMA - 2 How to determine if the medium is idle or not? Measuring the signal strength, voltage level CSMA Listen-before-talk Success Idle Idle CCA: Clear Channel Assessment RSSI: Received Signal Strength Ind. Collision Time Time SNU SCONE lab. 50 Performance P-Persistent CSMA CSMA/CD Chong-kwon Kim SNU SCONE lab. 51

14 CSMA Collision CSMA still suffers from collisions CSMA/CD (Collision Detection) Recall the second problem of Slotted Aloha Long Collision Slot How to shorten the length of collision slots? Method While transmitting a frame, listen if there is a collision If collision, terminate the transmission immediately How to detect collisions? In the case of a single transmission, the voltage level confined within a certain level Two or more concurrent transmissions cause higher than the normal voltage level How about Wireless link? 53 SNU SCONE lab. 54 CSMA/CD CD Duration How long should we listen for collision? Two times of the maximum propagation delay CSMA/CD Procedure SNU SCONE lab. 55 Failed transmission SNU SCONE lab. 56

15 Further (personal) investigations Various persistence methods Non/1/p-persistent The speed of Ethernet increased from 10 Mbps 100 Mbps 1 Gbps 10 Gbps 100 Gbps. Problem of high speed Ethrrnets. Solutions. Today s News Topic MAC (Sept. 18, Sept.) PD: 2.6 WLAN (Sept. 20, Oct. 25) PD: 2.7 Layer 3 Inter-networking, Bridge (Oct. 25 Supp.) PD: 3.1 Modern layer 2 switches no longer use CSMA/CD. They use switch fabrics that enable multi-point to multi-point dedicated full-duplex connections. SNU SCONE lab. 57 SNU SCONE lab. 58 Wireless Characteristics Performance of wireless links is much lower than that of wired links Wireless LAN WHY? Attenuation Chong-kwon Kim Root cause: Attenuation of wireless medium is much higher than that of wired medium SNU SCONE lab. 60

16 IEEE WLAN Standard IEEE a/b/g (1997) 2.4 GHz DS 1 & 2 Mbps1 & 2 Mbps.11b CCK 5.5 & 11 Mbps 2.4 GHz FH IR 5 GHz.11a OFDM 6~54 Mbps 1999 (up to 11 20MHz) TCP IP LLC MAC PLCP PMD PHY Three physical layer specifications operating at 1 and 2 Mbps Two additional parts in a and b IEEE b 2.4-GHz band at 5.5 and 11 Mbps Complementary code keying (CCK) modulation Input data treated in blocks of 8 bits at MHz 8 bits/symbol MHz = 11 Mbps.11g OFDM 6~54 Mbps 2003 (Both 2.4 GHz & 5 GHz) SNU SCONE lab. 61 SNU SCONE lab PHY a 5-GHz band up to 54 Mbps Uses orthogonal frequency division multiplexing (OFDM) Multiple carrier signals at different frequencies Data rates 6, 9, 12, 18, 24, 36, 48, and 54 Mbps Transmission Rates AMC: Adaptive Modulation & Coding Learn: Performance Anomaly Problem IEEE g (2002) Extends IEEE b to higher data rates Combines a and b IEEE n (2006) 100 Mbps 63 SNU SCONE lab. 64

17 Topology Infrastructure Mode All packets pass through the Access Point (AP) No direct communications between Mobile Stations (MS, or client/host) Ad-hoc mode Peer-to-peer (station-to-station) direct communications IEEE Architecture AP AP AP SNU SCONE lab. 65 SNU SCONE lab. 66 IEEE BSS / ESS Smallest building block is Basic Service Set (BSS) One AP and multiple stations Same MAC protocol Competing for access to same shared wireless medium BSSID (= MAC addr. of the AP) ESS (Extended Service Set) Two or more BSSes interconnected by DS Appears as a single logical LAN to LLC AP Logic within station that provides access to DS Provides DS services in addition to acting as station Portal Integrate IEEE architecture with wired LAN Wireless LAN - Signal & Interference Chong-kwon Kim SNU SCONE lab. 67

18 Basic Operation In CSMA/CD, we can be almost sure that a frame is delivered successfully in case of no collision No longer true in wireless networks How about CS Collision Detection is impossible In wireless links? 1. How do you know a frame is successfully transmitted? Use ACK Data 2. No ACK Retransmission A ACK should be transmitted before any other frames SNU SCONE lab. 69 Wireless Characteristics - CS Carrier sense Detect EM signal strength In wired networks, Sender s CS Receiver s CS O R T In wireless networks, CS at sender CS at receiver O R How do you know the receiver s channel status? T SNU SCONE lab. 70 Hidden / Exposed Terminal Hidden Terminal Problem C cannot sense BA transmission and attempts to send a frame RTS/CTS & Virtual CS Request To Send (RTS) & Clear To Send (CTS) Short control frames that specifies the intention to transmit (RTS) and willingness to receive (CTS) Specifies the remaining time of the transaction in RTS/CTS frames Network Allocation Vector(NAV) Exposed Terminal Problem C can send to D without disturbing AB transmission But, C thinks the medium is busy NAV NAV SNU SCONE lab. 71 SNU SCONE lab. 72

19 RTS/CTS & Hidden Terminal RTS/CTS & Exposed Terminal RTS/CTS can mitigate the hidden terminal problem SIFS Suppose you hear an RTS but not a CTS, what will you do? How long should you wait before sending your frame? Suppose you hear a CTS without RTS, what will you do? SNU SCONE lab. 73 RTS/CTS exchange cannot solve the exposed terminal problem SNU SCONE lab. 74 Today s News Topic MAC (Sept. 18, Sept.) PD: 2.6 WLAN (Sept. 20, Oct. 25) PD: 2.7 Layer 3 Inter-networking, Bridge (Oct. 25 Supp.) PD: 3.1 Supplementary class 7:00 PM this evening (Slightly) Revised note will be post today Wireless LAN -Protocol Chong-kwon Kim SNU SCONE lab. 75

20 Inter- Frame Space (IFS) An ACK should be immediately delivered IFS: Minimum time that the medium should be idle to transmit a frame SIFS (short IFS): For all immediate response actions RTS-CTS, DATA-ACK, Poll response PIFS (point coordination function IFS): Used by the centralized controller in PCF scheme when issuing polls DIFS (distributed coordination function IFS): Used as minimum delay for asynchronous frames contending for access Media Access Control Distributed wireless foundation MAC (DWFMAC) Distributed access control mechanism Lower sublayer is distributed coordination function (DCF) Contention algorithm to provide access to all traffic Point coordination function (PCF) Centralized MAC algorithm Contention free If SIFS < DIFS, then data frames cannot intervene DATA-ACK transaction SNU SCONE lab. 77 SNU SCONE lab. 78 DCF Basics DCF Basic DATA The DATA frame should wait at least DIFS to protect ACK, CTS and etc A frame that arrives while the medium is busy should wait extra in addition to DIFS The extra waiting time should be randomized In the case of collision, should reduce attempt rate SNU SCONE lab. 79 New packet Medium = Idle DATA New packet Medium = Busy DIFS Idle for DIFS Backoff counter = Rand[0, CW] Random Backoff DATA Collision? Slot, Δ Backoff counter = 0 DIFS After DIFS, decrease backoff Idle for DIFS counter by one if the medium is idle for Δ If medium is busy, freeze countdown SNU SCONE lab. 80

21 BEB (Binary Exp. Backoff) Example Collision = Overloaded Contention Window (CW) Backoff delay = Random (0.. CW) STA A Data A Data At the beginning, CW = CWmin For each unsuccessful transmission, double CW up to CWmax STA B BC=2 Data BC=1 STA C A SIFS STA D DIFS BC=5 DIFS DIFS SNU SCONE lab. 81 SNU SCONE lab. 82 DCF CSMA/CA Frame Format RTS/CTS exchange is optional BC=0 &!TxPend TxPend & CCA.busy CA (Collision Avoidance) Access Control Tx Idle TxPend & CCA>DIFS PLCP Header - DSSS Preamble (srt/long) PLCP header Sync 128 (56) SFD 16 Signal 8 Service 8 Length 16 CRC 16 MPDU 192 us Rate Indication 1 Mbps 1/2/5.5/11 Mbps No. of Bytes!(CCA>DIFS) Slot & CCA>DIFS Wait DIFS CCA>DIFS GetBC Access Control Back-off CCA>DIFS & BC=0 & TxPend TxSuccess Access Control Tx & Wait Ack TxFail BC=BC-1 CW=CWmin DoubleCW SNU SCONE GetBC lab. 83

22 MAC Frame Fields (1) Frame Control: Frame type/sub-type Control, management, or data To DS/From DS More fragment Retry Power Mgmt More data WEP Order Duration/Connection ID: Indicates time (in s) for successful transmission of MAC frame May contain AID (Association ID) MAC Frame Fields (2) Sequence Control: 4-bit fragment number subfield For fragmentation and reassembly 12-bit sequence number Number frames between given transmitter and receiver Frame Body: MSDU (or a fragment of) LLC PDU or MAC control information Frame Check Sequence: 32-bit CRC(Cyclic Redundancy Check) Address Fields To DS From DS Address 1 Address 2 Address 3 Address DA SA BSSID DA BSSID SA BSSID SA DA RA TA DA SA Address 1: All stations filter on this address Address 2: Transmitter address (TA) - Identify transmitter to address the ACK frame to Address 3: Dependent on To and From DS bits Address 4 : Only needed to identify the original source of WDS(Wireless DS) frames Wireless LAN - Other Features Chong-kwon Kim

23 AP Discovery To use AP 1. Discovery 2. Authentication 3. Association Scan Discover APs in transmission range Active scan, Passive scan Passive scan Client listen Beacon frames that AP transmits periodically Active scan Client probe the existence of APs by sending Probe request frame AP replies with Probe response frame Probe response frame SNU is SCONE similar lab. to Beacon frame 89 Authentication Open system and Shared key system Authentication Auth. Req Challenge Answer WEP Key SNU SCONE lab. 90 Association State 1 Unauthenticated Unassociated Authentication State 2 Authenticated Unassociated Association State 3 Authenticated Associated Deauthentication Notification Deassociation Notification Class 1 Frames Class 1 & 2 Frames Class 1,2 &3 Frames Association Request Allocate Association ID Association Response SNU SCONE lab. 91 Power Saving Energy is very scarce resource in mobile devices Network interfaces consume sizable amount of energy How to Conserve Energy? Turn off network interfaces when not in use PSM (Power Saving Mode) Sleep state Listen To sleep Signals to the AP not to send frames How to resume communication (Wakeup)? Transmission (Station AP) Reception (AP Station) SNU SCONE lab. 92

24 AP Packet Reception - PSM Beacon(TIM) Interval Station DTIM wakeups DTIM Interval DTIM Broadcast AP transmits beacons every beacon interval (~100msec) - Defer if channel is busy - PS nodes wake up for beacon reception TIM(Traffic Indication Map) - Indicate the existence of backlogged unicast traffic to PS nodes - PS node may request packet transmission Broadcast packets are announced by a Delivery TIM(DTIM) and are sent immediately afterwards - DTIM interval is a multiple of TIM interval AP Station Delivery in PS Mode If TIM indicates frames buffered STA sends PS-Poll to AP and stays awake to receive data DATA PS-Poll Learn U-APSD (Unscheduled Automatic Power Saving Delivery) SNU SCONE lab e QoS Priority and Parameterized QoS Priority scheme EDCA (Enhanced DCF Channel Access) Four access classes Different CW and AIFS Access Classes AC Description CW Min. AIFS 0 Background 15(31) 7 1 Best Effort 15(31) 3 2 Video 7(15) 2 or 1(AP) 3 Voice 3(7) 2 or 1(AP) Parameterized QoS scheme HCCA(Hybrid Coordination Function Channel Access) PCF based resource allocation AC3 AC2 AC1 AC0 2 0~3 slots 2 0~7 slots 3 0~15 slots 7 0~15 slots SIFS AIFS Random BC SNU SCONE lab. 95 SNU SCONE lab. 96

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984 CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Internet Protocol Stack

Internet Protocol Stack Internet Protocol Stack Application: supporting network applications FTP, SMTP, HTTP Transport: data transfer between processes TCP, UDP Network: routing of datagrams from source to destination IP, routing

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Functions of physical layer:

Functions of physical layer: Chapter 14 Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium Functions

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Nomadic Communications WLAN MAC Fundamentals

Nomadic Communications WLAN MAC Fundamentals Nomadic Communications WLAN 802.11 MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications Copyright Quest opera è

More information

IEEE Wireless LANs Part I: Basics

IEEE Wireless LANs Part I: Basics IEEE 802.11 Wireless LANs Part I: Basics Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.  Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : PW0-205 Title : Certified wireless analusis professional(cwap) Vendors : CWNP Version : DEMO Get Latest

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications

More information

Wireless Communication Session 4 Wi-Fi IEEE standard

Wireless Communication Session 4 Wi-Fi IEEE standard Wireless Communication Session 4 Wi-Fi IEEE802.11 standard M. Daneshvar Farzanegan Soourosh.blogfa.com smdanesh@yahoo.com 1 Reminder on frequencies and wavelenghts twisted pair coax cable optical transmission

More information

CSE 6811 Ashikur Rahman

CSE 6811 Ashikur Rahman Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands Outline 18-759 : Wireless s Lecture 11: 80.11 Peter Steenkiste Dina Papagiannaki Spring Semester 009 http://www.cs.cmu.edu/~prs/wireless09/ Peter A. Steenkiste, CMU 1 80 protocol overview Wireless LANs

More information

Lecture (08) Wireless Traffic Flow and AP Discovery

Lecture (08) Wireless Traffic Flow and AP Discovery Lecture (08) Wireless Traffic Flow and AP Discovery Dr. Ahmed ElShafee 1 Dr. Ahmed ElShafee, ACU Spring 2011, Wireless Network Agenda Wireless Frame Types Sending a Frames Wireless Frame Headers Frame

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

IEEE WLAN (802.11) Copyright. Nomadic Communications

IEEE WLAN (802.11) Copyright. Nomadic Communications Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 802.11 History and Standardization 802.11 Architectures and Layers 802.11 Frame Format and Addressing 802.11 Mac Layer (CSMA/CA) 2 Wifi 3 twisted pair

More information

Topic 4. Wireless LAN IEEE

Topic 4. Wireless LAN IEEE Topic 4 Wireless LAN IEEE 802.11 What we will learn in this lecture: Basics of IEEE 802.11 MAC layer CSMA/CA Security WEP protocol Wireless LANs: Characteristics Types Infrastructure based Adhoc Advantages

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Telecommunication Protocols Laboratory Course. Lecture 2

Telecommunication Protocols Laboratory Course. Lecture 2 Telecommunication Protocols Laboratory Course Lecture 2 Last time We began our study of telecommunication protocols at the Logical Link Control sub-layer (LLC) LLC issues Connectionless vs connection-oriented

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Local Area Networks. Lecture 17 Fall Token Ring and FDDI Local Area Networks Lecture 17 Fall 2010 Token Ring and FDDI IEEE 802.5 Ring LAN Unidirectional ring network 4 Mbps and 16 Mbps on twisted pair Differential Manchester line coding Token passing protocol

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Wireless LANs. Outline. Outline II. Benefits Applications Technologies Issues Configurations Overview of Standard

Wireless LANs. Outline. Outline II. Benefits Applications Technologies Issues Configurations Overview of Standard Wireless LANs Outline Benefits Applications Technologies Issues Configurations Overview of 802.11 Standard Dr. Michael S. Boykin Spring 02-2 Local Area Networks 2 Outline II MAC layer protocols PHY layer

More information

WLAN Technology: LAN: a review WLAN: applications & key parameters. protocol architectures

WLAN Technology: LAN: a review WLAN: applications & key parameters. protocol architectures WLAN Technology: LAN: a review WLAN: applications & key parameters IEEE 802.11 protocol architectures LOCAL AREA NETWORKS LAN ROUTER INTERNET WEB SERVER RAM Ethernet Processor RAM ROM A C NIC with unique

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

Transmission Control Protocol over Wireless LAN

Transmission Control Protocol over Wireless LAN Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview. TCP on wireless links Wireless MAC Assigned reading.

Wireless Intro : Computer Networking. Wireless Challenges. Overview. TCP on wireless links Wireless MAC Assigned reading. Wireless Intro 15-744: Computer Networking L-9 Wireless TCP on wireless links Wireless MAC Assigned reading [BPSK97] A Comparison of Mechanism for Improving TCP Performance over Wireless Links [BDS+94]

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Optional Point Coordination Function (PCF)

Optional Point Coordination Function (PCF) Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function

More information