Internet of Things 2017/2018
|
|
- Cuthbert Warner
- 5 years ago
- Views:
Transcription
1 Internet of Things 2017/2018 IoT (Wireless) Networks Johan Lukkien John Carpenter,
2 2
3 What are IoT networks? Guiding questions What is the role of IP? What techniques are used in wireless communications? techniques for media sharing techniques for reducing energy use Which standards are considered? 3
4 Some IoT protocol stacks DTLS/UDP (security) The IoT Architectural Framework, Design Issues and Application Domain, Gordana Gardasˇevic et al. 4
5 Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics Overview 5
6 General architecture Generic Physical organization IEEE e (WiMAX) 3G, 4G IEEE 802.3, (ethernet) IEEE (WiFi) IP-based network with wide-area coverage, wireless or wired and powerful servers AN IoT infrastructure: static ambient nodes attaching to clusters in lowest layer AN AN MN MN MN MN MN MN = AN = mobile node /network ambient node / network Moving clusters of nodes with sensing capability but often with limited resources e.g. single person moving around with sensors 6
7 Taxonomy Middle layer Multi hop Single hop (no hop) Bottom layer (ambient infra structure) (access points) Multi hop Single hop (no hop) Most general case: moving clusters through ambient infra structure ad-hoc networks Moving nodes connecting to ambient infra structure Moving clusters connecting to access points ad-hoc networks Moving nodes connecting to access points 7
8 Examples Middle layer Multi hop Single hop (no hop) Bottom layer (ambient infra structure) (access points) Multi hop vehicle to vehicle Single hop (no hop) phone vehicle to infra structure user wearing cluster of sensors connected to phone sensor in low power mesh network vehicle to infra structure user wearing sensors connected to phone laptop / wifi 8
9 Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics Overview 9
10 Layered protocols: OSI( 83) reference model Physical: sends bits on medium (i.e. standardizes the electrical, mechanical, and signalling interfaces) MAC / Data link: manages medium access, detects and corrects errors in frames; deliver frames on one-hop medium Network: send packets from sender to receiver machines using multihop routing Transport: breaks messages into packets; delivery guarantees; multiplexing ports typical frame structure payload 10
11 The hour glass of IP The essence of IP, and its success a unified protocol and naming (addressing) scheme to enable communication between any pair of devices all layer breaking or application knowledge is banned from lower layers until the transport layer it is only about exchanging bits: semantics only at endpoints Recent standardization towards application protocols (HTTP, CoAP) standardizes application structures diverse applications divergence COAP/UDP, HTTP/UDP, HTTP/TCP transport layer (UDP,TCP/IP) network layer IP convergence diverse physical layers 11
12 The essence of IoT Is IoT so much different? a unified protocol and naming (addressing) scheme to enable communication between any pair of devices things that contain embedded networked electronics, of course IP to every thing 12
13 IP to Every Thing? IP connectivity comes with hidden assumptions endpoints are active, reachable by IP packets Devices cannot always guarantee this passive nodes, when there is no device to power wirelessly battery-less nodes duty cycling, or off-time planning incapability to process IP IP-Zigbee bridge zigbee (non-ip) domain Legacy may prevent IP to endpoints existing networks, without capability to use IP Bridging light applications to the IP domain, Bui, Lukkien et. al., ICCE 2011 Need technology to solve this (discussed later) 13
14 Example: which (IP) protocols occur in a lighting network? Connectivity: 6LoWPAN (= adaptation for IP/ ), UDP, TCP [sometimes] RPL, RIP, MPL: routing, multicasting DTLS: packet based security Application Trickle: application protocol for dissemination to all devices in a network RESTful style REST plus HTTP methods CoAP constrained application protocol DNS-SD using mdns, or CoAP directory: for service discovery M2M protocols, e.g. MQTT/TCP Courtesy of Dee Denteneer 14
15 Example application: intelligent outdoor lighting Testbed in Achtse Barrier specialized communication stack, based Real-time, local behavior light setting based on movement sensors Collect data about movements in the street Simulate lighting strategies using those data 15
16 Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics Overview 16
17 How do end points communicate? 17
18 Networking approaches Physical neighbors: Shared medium or Point-to-point In case of physical separation switching (layer 2) connecting networks (layer 3) multiple interfaces for some nodes Packet oriented Full connectivity by (intelligent) flooding send packet to everyone recursively routing series of hops shared medium point to point 18
19 Wired: Wired or wireless admits nodes to be powered through the network as well, e.g. Power over Ethernet (PoE) no real need for very low resource devices (except power) difficult to scale to large numbers forbids mobility Wireless: typical for really large numbers of devices installed at difficult to reach locations required for mobility is an inherently unreliable medium can still either be battery powered or connected to mains from bloomberg.com 19
20 Wired Wireless Battery Mains Energy limitations will determine uptime communication behavior and protocols. In principle, the wire could be used for power; and at least for waking up nodes No real need for low resources except cost and energy; this class captures regular office/home infra structure devices Energy limitations will determine uptime, communication behavior and protocols; nodes must manage their sleeping behavior; nodes can be mobile Wireless is there for convenience (absence of other infra - outdoors) and for connecting to mobile wireless nodes; powerful wireless protocols can be used, always on 20
21 The LANs Taken from Wikipedia (Nov. 2017) 21
22 The LANs Taken from Wikipedia (Nov. 2017) Important for IoT: the 3 group (ethernet, PoE) the 11 group ( WiFi ) the 15 group (wireless PAN) Within IEEE x: Bluetooth, BT LE 4x: PHY/MAC layer for ZigBee, 6LoWPAN, Thread, WirelessHART, MiWi ContikiMAC, 6Tisch 22
23 The LANs Taken from Wikipedia (Nov. 2017) Important for IoT: the 3 group (ethernet, PoE) the 11 group ( WiFi ) the 15 group (wireless PAN) Within IEEE x: Bluetooth, BT LE 4x: PHY/MAC layer for ZigBee, 6LoWPAN, Thread, WirelessHART, MiWi ContikiMAC, 6Tisch Within the IEEE LANs: 11p: ITS 11e: QoS 11s: meshing 11ah: low power, low interference (HaLow) 23
24 Overview Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics 24
25 Shared medium A shared medium can be a wire or bus, but also a wireless connection standards must address this sharing, avoiding destructive interference wired: typically, bus protocols Wireless communication is intrinsically subject to errors received signal is the energy collected over time can always be disturbed by an external party (a different protocol family in same frequency), or by another neighbor than the sender quality depends on environment properties (e.g. reflections) Wireless communication is energy-hungry, particularly when compared to the energy used by embedded processors Standards must address the unreliability, sharing and energy use 25
26 What techniques are applied for wireless? FDMA: multiple channels (frequency division multiple access) channel hopping with synchronization e.g (Bluetooth), 6tisch, cell formation / independent domains e.g. 3/4G, IEEE (WiFi) TDMA: division in timeslots (time division multiple access) timeslots with schedules, time synchronization e.g. WirelessHART, DECT, IEEE in superframe mode in combination with cell formation Master-Slave e.g. an access point as master beacon-based signaling e.g. IEEE (WiFi), Bluetooth, IEEE CSMA: try before you cry (carrier sense multiple access) Clear Channel Assessment: Aloha with collision avoidance, detection or resolution e.g. IEEE (ZigBee): random distribution of retries with priority e.g. IEEE e (WiFi + QoS) CDMA (code division multiple access, as in 4G) concurrent access of the medium with coded packets admits decoding even with interference Regulation duty cycle restrictions (e.g. 1% per station) frequency assignment 26
27 FDMA (FDM) Use FDMA for several independent point-to-point channels Use FDMA for increasing reliability, e.g., isolation to a quiet channel multiple transceivers frequency hopping, avoiding crowded frequencies (6tisch, Bluetooth) together with timeslots (TDMA) OFDM: coding using multiple frequencies from internet source 27
28 CSMA/CD CSMA/CD: (fully distributed) protocol for sharing a wired medium, using the following algorithm: sense carrier, wait until it is ready (i.e., free) transmit and monitor for collision upon collision: transmit jam signal until minimum frame size (time) has been reached update counters and check for maximum retransmit backoff random time (dependent on # collisions) continue with sensing carrier complete transmission Used in (shared medium) ethernet (which is obsolete) 28
29 CSMA/CR CSMA/CR: (fully distributed) protocol for sharing a wired medium, using the following algorithm: sense carrier, wait until it is ready transmit and monitor for detecting a collision. upon collision: priority-based choice which station continues upon loss (low priority): resume sensing carrier upon win (high priority): continue transmission complete transmission Used in CAN (in-vehicle bus). Millions of deployments. 29
30 CSMA/CA: (fully distributed) protocol for sharing a (wireless) medium, using the following algorithm: sense carrier when active: back-off for a random period and retry for a given maximum number of trials when not active: send message; wait for ack ack received: ok CSMA/CA no ack received: transmission failed (e.g. collision), retry (up to maximum) Collisions: are due to unfortunate timing or to hidden nodes In wireless networks, collisions cannot be detected by the sending node (major difference with wired) discovered by absence of ACK Back-off time: increases with number of retries 30
31 CSMA: Hidden stations, unicast and broadcast Wireless communication has a limited range collisions can occur between nodes in the same range (NN) or two nodes that cannot see each other disturb a third one (HN) In case of unicast: sender warns its neighbors using an RTS signal receiver responds, and warns its neighbors by responding with CTS confirm receipt using an ACK (with immediate feedback) In case of broadcast this does not work (neither ACK nor CTS) don t know the receivers, in general 31
32 Beacons Beacons are periodic packet broadcasts beacons enforce a globally slotted structure of the medium access superframe, beacon interval the beacon sender has the role of master of the medium (during the superframe) the beacon describes the structure of the period until the next beacon, and how nodes have to behave in that period from overhearing a beacon a node understands next beacon time, when it is (allowed) to transmit and which protocol to use, when to change frequency clock synchronization is required, and the beacon may be used for this from IEEE
33 IEEE beacons CAP: contention access period CSMA/CA CFP: contention free period (assigned slots) GTS: Guaranteed Time Slot BI: Beacon Interval 16 equal time slots SD: Superframe duration shorter than BI to admit duty cycling, or the superframe of another station 33
34 Example: IEEE IEEE MAC protocols are generally CSMA/CA Original IEEE MAC: infra structure mode vs ad-hoc mode infra structure: all communication via an access point Distributed Coordination Function + RTS/CTS just CSMA/CA no prioritization Point Coordination Function (in infrastructure mode only) beaconing (access point is master) Contention-free part of the superframe: AP polls the stations Contention period: DCF no further classing of stations or traffic 34
35 QoS extensions to IEEE IEEE e TXOP: (transmission opportunity) contention-free period (CFP) to be given to stations EDCA: Enhanced Distributed Channel Access fully distributed probabilistic flow prioritization access categories: settings of the MAC to be associated with a group of flows with the same characteristics 36
36 Initial waiting time series of packets Initial waiting time 37
37 EDCA Parameters for a backoff process in access control class q: AIFSN q : initial wait time TXOPLimit q : max. #packets sent arbitration inter frame space transmission opportunity limit [0..CWmin q, CW q, CWmax q ]: contention window contention window minimum, current, maximum RetryLimit q : #trials before giving up Further relevant parameters SIFS: mandatory wait aslottime: time unit short inter frame space AIFS = SIFS + AIFSN x aslottime 38
38 EDCA algorithm, very roughly 1. Select a number of backoff slots in variable bc uniformly from an interval [0..CW] there is some debate if this backoff is there only after contention was observed 2. wait for the channel to be idle for AIFS; only then downcount bc 3. suspend this downcounting upon the media being active; upon resume wait AIFS first 4. when bc reaches 0 transmit frame wait for ack if this does not arrive, double the size of the interval and retry (exponential backoff) 5. after RetryLimit trials: drop the frame 6. after the first succesful frame: transmit available frames until TXOPLimit has been reached or frames run out 39
39 Effects of parameters During contention, the behavior of competing processes (hence, stations) becomes more synchronized A process with a lower AIFS: gets to downcount its bc more often A process with a lower CWMin / CWMax: has its bc reach 0 faster A process with a higher TXOP: gets to send larger messages (more frames) Hence, there are two mechanisms: gain control: even possible to define priorities in this way retain control 42
40 TDMA (time division multiple access) Divide time into fixed periods (slots) and assign transmission slots to stations typically, two-level hierarchy: slots and frames (group of slots) admits slot-based interaction between stations within a frame tricky with multiple cells (hidden nodes) needs multiple frequencies potentially wasteful as not all slots are used Requires time synchronization Requires a master for managing the assignment Both wired and wireless from wikipedia 43
41 Wired Wireless Shared medium Point to point CSMA/CD: coax ethernet CSMA/CR: CAN TDMA token passing: profibus Master/Slave: ethercat (,profibus) Switched ethernet: PoE Common way to set up larger networks using switches and routers MA/CA: (pure) Aloha CSMA/CA: Wifi, Zigbee TDMA: Wireless Hart Master/Beaconing: Wifi, Zigbee FDMA + channel hopping: bluetooth (low energy), 6tisch CDMA: virtual point to point (4G), Chirp Spread Spectrum UWB FDMA Dedicated frequencies for long-haul transport: satellite 44
42 Overview Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics 45
43 Energy, in low capacity environment Radio communication is a major contributor to energy consumption don t use it Applied techniques (combinations, need support at multiple layers) asymmetry low-power nodes are 1 hop away from well-powered infra control the transmit / receive power trade connectivity for energy duty cycle switch node or radio on and off periodically demand driven event driven control of radio (wakeup radio (IEEE ba), or push mode) with asymmetry push / pull strategies let the low power partner always be the one that takes initiative trade power for range and throughput special network technologies, special physical layers 46
44 Duty Cycling Strict interpretation: station switches on radio with a certain frequency and for a certain time Problem: how to meet each other Options: strict time synchronization energy expensive sender initiated send wakeup sufficiently often to guarantee reception wakeup = packet or wakeup = rendez-vous time receiver initiated switch transceiver on sufficiently long to guarantee meeting the sender or enforce exchange: send receive request (similar as above) asymmetry: one party always on (question: useful for both send and receive?) Guclu, Ozcelebi, Lukkien, Dependability Analysis of Asynchronous Radio Duty Cycling Protocols, ICCCN
45 Example for IEEE e CSL (CSL: Coordinated Sampled Listening) Broadcast: transmit rendez-vous sufficiently often for all receivers to see it Unicast: tune-in to the periodic behavior of the receiver to reduce overhead include acknowledge Guclu, Ozcelebi, Lukkien, Dependability Analysis of Asynchronous Radio Duty Cycling Protocols, ICCCN
46 Consider a low-resource node: Asymmetry and event driven 1. upon observing an event it wants to report it (push by node) 2. it may need information for its work (pull by node) 3. the environment of the node may want to send it information, updates or other (push by environment) 4. the environment may want to have information from the node (pull by environment) Solutions: 3,4: map to time driven behavior: align communication with periodic synchronization of the node with its environment keep alive plus handling pending request inevitably, this introduces a delay, particularly for 4. 1,2; provide always-on environment for demand driven radio control to reduce latency; can also map to time driven behavior of the node 49
47 Overview Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics 50
48 Outdoor Wired No common infra structure available; some initiatives via light poles or other relatively dense infra Wireless City WiFi 4G/5G: LTE adaptation, LongRange low power WAN technologies Indoor Standard wired infra structure using UTP, fiber, switches, bridges and routers WiFi Bluetooth IEEE based technologies 51
49 Typical tradeoffs are among communication range, data rate, transceiver power and spectrum usage As a rule of thumb, Tradeoffs Increasing range decreases data rate (fix power, use modulation that can be demodulated farther away) Increasing range increases power use (fix modulation and data rate) Increasing power increases data rate (can go to higher modulation with the same error rate) increasing spectrum usage (spreading) increases range and decreases power Note: sketched dependencies are not automatic but require changes in encoding and modulation schemes. Outdoor IoT: long range, low data rate, low power 52
50 Long range: LoRaWAN Picture from LoRa whitepaper on lora-alliance.org 53
51 LoRaWAN (Long Range Wireless WAN), by LoRa Alliance topology: star, IP-connected (L2, act as transparent bridge) gateways single-hop wireless towards sensors physical layer: CHIRP, spread spectrum, wideband (Semtech patent) distinct frequencies Aloha based MAC (just send) bitrate: Adaptive Data Rate, managed by gateway, 0.3kbps 50kbps trading range for bitrate Long range: LoRaWAN device types class A one uplink, two downlink packets device initiated, aloha-like class B: add extra scheduled receive slots class C: always on services geolocation Identification and security Unique Network key (EUI64), ensure security on network level Unique Application key (EUI64) ensure end to end security on application level Device specific key (EUI128) 54
52 From link-labs site Scalability, up to 120 All gateways and nodes use the same channels for all transmissions. Time on air can be quite long. (up to 2 seconds) All uplink transmissions are uncoordinated (Pure Aloha) All gateway transmissions (Acknowledgement and downlink traffic) take the gateway off the air, unbeknownst to nodes trying to transmit. SX1301 based LoRa gateways have only 8 receiver modems to process simultaneous traffic. Improvements Frequency Block Hopping Dynamic Transmit Power and Spreading Factor Selection Synchronous Uplink Slotting Variable Uplink/Downlink Time Boundary Compressed Acknowledgements Quality of Service Listen before talk 55
53 LTE (4G), by 3GPP LTE IoT network: Integrated with the normal 4G network LTE-M(TC) machine type communication end-point negotiated wakeup scheme extended discontinuous repetition, DRX small 1.4MHz assigned bandwidth fraction simplifies receivers Narrowband LTE-MTC further limit the bandwidth to 200KHz 200kpbs down/144kpbs up NB-IoT DSSS (direct-sequence spread spectrum less complex receivers interferes with regular LTE, in principle Since October 2016, NB-IoT is actually deployed 56
54 New low power WAN: NB-FI WAVIoT: Narrowband Fidelity starting at 8bps (!) Further similar issues as LoRa trade range for data rate has some APIs and protocols some sample installations, Seems to make the standard error of implementing the entire OSI stack rather than connecting to IP 57
55 from (November 2017, unverified) 58
56 Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics Overview 59
57 Metrics (which is how to judge all this) throughput number of bytes per time unit for a station: bytes per interval latency or delay jitter time difference in initiation of a transmission and the start of the receipt consists of processing delay, transmission delay and queueing delay variations in timing, e.g. delay jitter, throughput jitter fairness, ability to prioritize fairness: bound on delay in access to a transmission channel or fair share in competition overhead scalability as utilization increasing the amount of communication increasing # stations e.g. CSMA/CA scales badly when increasing # stations while TDMA scales well as dimensioning predictability reliability LoRaWan can scale the number of gateways with the number of low-power nodes e.g. resilience agains interference power range 60
58 Qualitative metrics +: improves (e.g. Latency + means improves (reduces) Latency) -: makes worse o: no effect/not applicable 61
59 What are IoT networks? Guiding questions What is the role of IP? What techniques are used? techniques for media sharing techniques for reducing energy use Which standards are considered? 62
Internet of Things 2017/2018
Internet of Things 2017/2018 The Things Johan Lukkien John Carpenter, 1982 1 Guiding questions What to think about things and how are they connected? 2 Resource limitations Memory: available flash ( program
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationPrinciples of Wireless Sensor Networks. Medium Access Control and IEEE
http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationWireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs
Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationstandards like IEEE [37], IEEE [38] or IEEE [39] do not consider
Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationMAC LAYER. Murat Demirbas SUNY Buffalo
MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationWireless Sensor Networks
Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision
More informationMedium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra
Medium Access Control in Wireless IoT Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions
More informationWPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/
WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network
More informationLow Power Wide Area Network (LPWAN) Presented By: Dr. Hafiz Yasar Lateef Director, Telxperts Pty Ltd.
Low Power Wide Area Network (LPWAN) Presented By: Dr. Hafiz Yasar Lateef Director, Telxperts Pty Ltd. Low Power Wide Area Network (LPWAN) q Low-Power WAN Technologies are designed for machine-to-machine
More informationMedium Access Control in Wireless Networks
Medium Access Control in Wireless Networks Prof. Congduc Pham http://www.univ-pau.fr/~cpham Université de Pau, France MAC layer Routing protocols Medium Acces Control IEEE 802.X MAC GSM (2G) Channels Downlink
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationMedium Access Control in Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationWireless Local Area Network (IEEE )
Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationSmart test and certification of wireless IoT devices
Smart test and certification of wireless IoT devices Joerg Koepp IoT Market Segment Manager COMPANY REST RICT ED Connecting Billions of Devices to the Internet of Things (IoT) short range WWAN other Wireless
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationMedium Access Control Sublayer Chapter 4
Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationInternet Structure. network edge:
Midterm Review Internet Structure network edge: Hosts: clients and servers Server often in data centers access networks, physical media:wired, wireless communication links network core: interconnected
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationMedium Access Control
Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless
More informationEL2745 Principles of Wireless Sensor Networks
EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationPrinciples of Wireless Sensor Networks
Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationChapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du
Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationLink Layer: Retransmissions
Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability
More informationAdvanced Networking Technologies
Advanced Networking Technologies Chapter 4 Medium Access Control Protocols (Acknowledgement: These slides have been prepared by Prof. Dr. Holger Karl) Advanced Networking (SS 16): 04 Medium Access Control
More informationIntroduction to IEEE
Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationCS 332 Computer Networks Wireless Networks
CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationMedium Access Control in Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18
More informationLecture 17: Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More informationJunseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea
Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea http://usn.konkuk.ac.kr/~jskim 1 IEEE 802.x Standards 802.11 for Wireless Local Area Network 802.11 legacy clarified 802.11 legacy
More informationLogical Link Control (LLC) Medium Access Control (MAC)
Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationTopic 02: IEEE
Topic 02: IEEE 802.15.4 Tuesday 20 Feb 2007 ICTP-ITU School on Wireless Networking for Scientific Applications in Developing Countries Bhaskaran Raman Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/
More informationEclipse IOT day April 3016 LoRa Overview. Wyres SAS 2016
Eclipse IOT day April 3016 LoRa Overview brian.wyld@wyres.fr www.wyres.eu Wyres SAS 2016 Contents LoRa objectives LoRa PHY overview Licenses / State regulation LoRa MAC : LoRaWAN Other MAC protocols Technology
More informationWireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR
Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR R ETHINKING SENSING TECHNOLOGY About Beanair (1/2) Designer and manufacturer of Wireless Sensor Networks Embedded measurement Process
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationCS/ECE 439: Wireless Networking. MAC Layer Road to Wireless
CS/ECE 439: Wireless Networking MAC Layer Road to Wireless Multiple Access Media Media access Controlling which frame should be sent over the link next Easy for point-to-point links; half versus full duplex
More information