Internet of Things 2017/2018

Size: px
Start display at page:

Download "Internet of Things 2017/2018"

Transcription

1 Internet of Things 2017/2018 IoT (Wireless) Networks Johan Lukkien John Carpenter,

2 2

3 What are IoT networks? Guiding questions What is the role of IP? What techniques are used in wireless communications? techniques for media sharing techniques for reducing energy use Which standards are considered? 3

4 Some IoT protocol stacks DTLS/UDP (security) The IoT Architectural Framework, Design Issues and Application Domain, Gordana Gardasˇevic et al. 4

5 Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics Overview 5

6 General architecture Generic Physical organization IEEE e (WiMAX) 3G, 4G IEEE 802.3, (ethernet) IEEE (WiFi) IP-based network with wide-area coverage, wireless or wired and powerful servers AN IoT infrastructure: static ambient nodes attaching to clusters in lowest layer AN AN MN MN MN MN MN MN = AN = mobile node /network ambient node / network Moving clusters of nodes with sensing capability but often with limited resources e.g. single person moving around with sensors 6

7 Taxonomy Middle layer Multi hop Single hop (no hop) Bottom layer (ambient infra structure) (access points) Multi hop Single hop (no hop) Most general case: moving clusters through ambient infra structure ad-hoc networks Moving nodes connecting to ambient infra structure Moving clusters connecting to access points ad-hoc networks Moving nodes connecting to access points 7

8 Examples Middle layer Multi hop Single hop (no hop) Bottom layer (ambient infra structure) (access points) Multi hop vehicle to vehicle Single hop (no hop) phone vehicle to infra structure user wearing cluster of sensors connected to phone sensor in low power mesh network vehicle to infra structure user wearing sensors connected to phone laptop / wifi 8

9 Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics Overview 9

10 Layered protocols: OSI( 83) reference model Physical: sends bits on medium (i.e. standardizes the electrical, mechanical, and signalling interfaces) MAC / Data link: manages medium access, detects and corrects errors in frames; deliver frames on one-hop medium Network: send packets from sender to receiver machines using multihop routing Transport: breaks messages into packets; delivery guarantees; multiplexing ports typical frame structure payload 10

11 The hour glass of IP The essence of IP, and its success a unified protocol and naming (addressing) scheme to enable communication between any pair of devices all layer breaking or application knowledge is banned from lower layers until the transport layer it is only about exchanging bits: semantics only at endpoints Recent standardization towards application protocols (HTTP, CoAP) standardizes application structures diverse applications divergence COAP/UDP, HTTP/UDP, HTTP/TCP transport layer (UDP,TCP/IP) network layer IP convergence diverse physical layers 11

12 The essence of IoT Is IoT so much different? a unified protocol and naming (addressing) scheme to enable communication between any pair of devices things that contain embedded networked electronics, of course IP to every thing 12

13 IP to Every Thing? IP connectivity comes with hidden assumptions endpoints are active, reachable by IP packets Devices cannot always guarantee this passive nodes, when there is no device to power wirelessly battery-less nodes duty cycling, or off-time planning incapability to process IP IP-Zigbee bridge zigbee (non-ip) domain Legacy may prevent IP to endpoints existing networks, without capability to use IP Bridging light applications to the IP domain, Bui, Lukkien et. al., ICCE 2011 Need technology to solve this (discussed later) 13

14 Example: which (IP) protocols occur in a lighting network? Connectivity: 6LoWPAN (= adaptation for IP/ ), UDP, TCP [sometimes] RPL, RIP, MPL: routing, multicasting DTLS: packet based security Application Trickle: application protocol for dissemination to all devices in a network RESTful style REST plus HTTP methods CoAP constrained application protocol DNS-SD using mdns, or CoAP directory: for service discovery M2M protocols, e.g. MQTT/TCP Courtesy of Dee Denteneer 14

15 Example application: intelligent outdoor lighting Testbed in Achtse Barrier specialized communication stack, based Real-time, local behavior light setting based on movement sensors Collect data about movements in the street Simulate lighting strategies using those data 15

16 Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics Overview 16

17 How do end points communicate? 17

18 Networking approaches Physical neighbors: Shared medium or Point-to-point In case of physical separation switching (layer 2) connecting networks (layer 3) multiple interfaces for some nodes Packet oriented Full connectivity by (intelligent) flooding send packet to everyone recursively routing series of hops shared medium point to point 18

19 Wired: Wired or wireless admits nodes to be powered through the network as well, e.g. Power over Ethernet (PoE) no real need for very low resource devices (except power) difficult to scale to large numbers forbids mobility Wireless: typical for really large numbers of devices installed at difficult to reach locations required for mobility is an inherently unreliable medium can still either be battery powered or connected to mains from bloomberg.com 19

20 Wired Wireless Battery Mains Energy limitations will determine uptime communication behavior and protocols. In principle, the wire could be used for power; and at least for waking up nodes No real need for low resources except cost and energy; this class captures regular office/home infra structure devices Energy limitations will determine uptime, communication behavior and protocols; nodes must manage their sleeping behavior; nodes can be mobile Wireless is there for convenience (absence of other infra - outdoors) and for connecting to mobile wireless nodes; powerful wireless protocols can be used, always on 20

21 The LANs Taken from Wikipedia (Nov. 2017) 21

22 The LANs Taken from Wikipedia (Nov. 2017) Important for IoT: the 3 group (ethernet, PoE) the 11 group ( WiFi ) the 15 group (wireless PAN) Within IEEE x: Bluetooth, BT LE 4x: PHY/MAC layer for ZigBee, 6LoWPAN, Thread, WirelessHART, MiWi ContikiMAC, 6Tisch 22

23 The LANs Taken from Wikipedia (Nov. 2017) Important for IoT: the 3 group (ethernet, PoE) the 11 group ( WiFi ) the 15 group (wireless PAN) Within IEEE x: Bluetooth, BT LE 4x: PHY/MAC layer for ZigBee, 6LoWPAN, Thread, WirelessHART, MiWi ContikiMAC, 6Tisch Within the IEEE LANs: 11p: ITS 11e: QoS 11s: meshing 11ah: low power, low interference (HaLow) 23

24 Overview Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics 24

25 Shared medium A shared medium can be a wire or bus, but also a wireless connection standards must address this sharing, avoiding destructive interference wired: typically, bus protocols Wireless communication is intrinsically subject to errors received signal is the energy collected over time can always be disturbed by an external party (a different protocol family in same frequency), or by another neighbor than the sender quality depends on environment properties (e.g. reflections) Wireless communication is energy-hungry, particularly when compared to the energy used by embedded processors Standards must address the unreliability, sharing and energy use 25

26 What techniques are applied for wireless? FDMA: multiple channels (frequency division multiple access) channel hopping with synchronization e.g (Bluetooth), 6tisch, cell formation / independent domains e.g. 3/4G, IEEE (WiFi) TDMA: division in timeslots (time division multiple access) timeslots with schedules, time synchronization e.g. WirelessHART, DECT, IEEE in superframe mode in combination with cell formation Master-Slave e.g. an access point as master beacon-based signaling e.g. IEEE (WiFi), Bluetooth, IEEE CSMA: try before you cry (carrier sense multiple access) Clear Channel Assessment: Aloha with collision avoidance, detection or resolution e.g. IEEE (ZigBee): random distribution of retries with priority e.g. IEEE e (WiFi + QoS) CDMA (code division multiple access, as in 4G) concurrent access of the medium with coded packets admits decoding even with interference Regulation duty cycle restrictions (e.g. 1% per station) frequency assignment 26

27 FDMA (FDM) Use FDMA for several independent point-to-point channels Use FDMA for increasing reliability, e.g., isolation to a quiet channel multiple transceivers frequency hopping, avoiding crowded frequencies (6tisch, Bluetooth) together with timeslots (TDMA) OFDM: coding using multiple frequencies from internet source 27

28 CSMA/CD CSMA/CD: (fully distributed) protocol for sharing a wired medium, using the following algorithm: sense carrier, wait until it is ready (i.e., free) transmit and monitor for collision upon collision: transmit jam signal until minimum frame size (time) has been reached update counters and check for maximum retransmit backoff random time (dependent on # collisions) continue with sensing carrier complete transmission Used in (shared medium) ethernet (which is obsolete) 28

29 CSMA/CR CSMA/CR: (fully distributed) protocol for sharing a wired medium, using the following algorithm: sense carrier, wait until it is ready transmit and monitor for detecting a collision. upon collision: priority-based choice which station continues upon loss (low priority): resume sensing carrier upon win (high priority): continue transmission complete transmission Used in CAN (in-vehicle bus). Millions of deployments. 29

30 CSMA/CA: (fully distributed) protocol for sharing a (wireless) medium, using the following algorithm: sense carrier when active: back-off for a random period and retry for a given maximum number of trials when not active: send message; wait for ack ack received: ok CSMA/CA no ack received: transmission failed (e.g. collision), retry (up to maximum) Collisions: are due to unfortunate timing or to hidden nodes In wireless networks, collisions cannot be detected by the sending node (major difference with wired) discovered by absence of ACK Back-off time: increases with number of retries 30

31 CSMA: Hidden stations, unicast and broadcast Wireless communication has a limited range collisions can occur between nodes in the same range (NN) or two nodes that cannot see each other disturb a third one (HN) In case of unicast: sender warns its neighbors using an RTS signal receiver responds, and warns its neighbors by responding with CTS confirm receipt using an ACK (with immediate feedback) In case of broadcast this does not work (neither ACK nor CTS) don t know the receivers, in general 31

32 Beacons Beacons are periodic packet broadcasts beacons enforce a globally slotted structure of the medium access superframe, beacon interval the beacon sender has the role of master of the medium (during the superframe) the beacon describes the structure of the period until the next beacon, and how nodes have to behave in that period from overhearing a beacon a node understands next beacon time, when it is (allowed) to transmit and which protocol to use, when to change frequency clock synchronization is required, and the beacon may be used for this from IEEE

33 IEEE beacons CAP: contention access period CSMA/CA CFP: contention free period (assigned slots) GTS: Guaranteed Time Slot BI: Beacon Interval 16 equal time slots SD: Superframe duration shorter than BI to admit duty cycling, or the superframe of another station 33

34 Example: IEEE IEEE MAC protocols are generally CSMA/CA Original IEEE MAC: infra structure mode vs ad-hoc mode infra structure: all communication via an access point Distributed Coordination Function + RTS/CTS just CSMA/CA no prioritization Point Coordination Function (in infrastructure mode only) beaconing (access point is master) Contention-free part of the superframe: AP polls the stations Contention period: DCF no further classing of stations or traffic 34

35 QoS extensions to IEEE IEEE e TXOP: (transmission opportunity) contention-free period (CFP) to be given to stations EDCA: Enhanced Distributed Channel Access fully distributed probabilistic flow prioritization access categories: settings of the MAC to be associated with a group of flows with the same characteristics 36

36 Initial waiting time series of packets Initial waiting time 37

37 EDCA Parameters for a backoff process in access control class q: AIFSN q : initial wait time TXOPLimit q : max. #packets sent arbitration inter frame space transmission opportunity limit [0..CWmin q, CW q, CWmax q ]: contention window contention window minimum, current, maximum RetryLimit q : #trials before giving up Further relevant parameters SIFS: mandatory wait aslottime: time unit short inter frame space AIFS = SIFS + AIFSN x aslottime 38

38 EDCA algorithm, very roughly 1. Select a number of backoff slots in variable bc uniformly from an interval [0..CW] there is some debate if this backoff is there only after contention was observed 2. wait for the channel to be idle for AIFS; only then downcount bc 3. suspend this downcounting upon the media being active; upon resume wait AIFS first 4. when bc reaches 0 transmit frame wait for ack if this does not arrive, double the size of the interval and retry (exponential backoff) 5. after RetryLimit trials: drop the frame 6. after the first succesful frame: transmit available frames until TXOPLimit has been reached or frames run out 39

39 Effects of parameters During contention, the behavior of competing processes (hence, stations) becomes more synchronized A process with a lower AIFS: gets to downcount its bc more often A process with a lower CWMin / CWMax: has its bc reach 0 faster A process with a higher TXOP: gets to send larger messages (more frames) Hence, there are two mechanisms: gain control: even possible to define priorities in this way retain control 42

40 TDMA (time division multiple access) Divide time into fixed periods (slots) and assign transmission slots to stations typically, two-level hierarchy: slots and frames (group of slots) admits slot-based interaction between stations within a frame tricky with multiple cells (hidden nodes) needs multiple frequencies potentially wasteful as not all slots are used Requires time synchronization Requires a master for managing the assignment Both wired and wireless from wikipedia 43

41 Wired Wireless Shared medium Point to point CSMA/CD: coax ethernet CSMA/CR: CAN TDMA token passing: profibus Master/Slave: ethercat (,profibus) Switched ethernet: PoE Common way to set up larger networks using switches and routers MA/CA: (pure) Aloha CSMA/CA: Wifi, Zigbee TDMA: Wireless Hart Master/Beaconing: Wifi, Zigbee FDMA + channel hopping: bluetooth (low energy), 6tisch CDMA: virtual point to point (4G), Chirp Spread Spectrum UWB FDMA Dedicated frequencies for long-haul transport: satellite 44

42 Overview Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics 45

43 Energy, in low capacity environment Radio communication is a major contributor to energy consumption don t use it Applied techniques (combinations, need support at multiple layers) asymmetry low-power nodes are 1 hop away from well-powered infra control the transmit / receive power trade connectivity for energy duty cycle switch node or radio on and off periodically demand driven event driven control of radio (wakeup radio (IEEE ba), or push mode) with asymmetry push / pull strategies let the low power partner always be the one that takes initiative trade power for range and throughput special network technologies, special physical layers 46

44 Duty Cycling Strict interpretation: station switches on radio with a certain frequency and for a certain time Problem: how to meet each other Options: strict time synchronization energy expensive sender initiated send wakeup sufficiently often to guarantee reception wakeup = packet or wakeup = rendez-vous time receiver initiated switch transceiver on sufficiently long to guarantee meeting the sender or enforce exchange: send receive request (similar as above) asymmetry: one party always on (question: useful for both send and receive?) Guclu, Ozcelebi, Lukkien, Dependability Analysis of Asynchronous Radio Duty Cycling Protocols, ICCCN

45 Example for IEEE e CSL (CSL: Coordinated Sampled Listening) Broadcast: transmit rendez-vous sufficiently often for all receivers to see it Unicast: tune-in to the periodic behavior of the receiver to reduce overhead include acknowledge Guclu, Ozcelebi, Lukkien, Dependability Analysis of Asynchronous Radio Duty Cycling Protocols, ICCCN

46 Consider a low-resource node: Asymmetry and event driven 1. upon observing an event it wants to report it (push by node) 2. it may need information for its work (pull by node) 3. the environment of the node may want to send it information, updates or other (push by environment) 4. the environment may want to have information from the node (pull by environment) Solutions: 3,4: map to time driven behavior: align communication with periodic synchronization of the node with its environment keep alive plus handling pending request inevitably, this introduces a delay, particularly for 4. 1,2; provide always-on environment for demand driven radio control to reduce latency; can also map to time driven behavior of the node 49

47 Overview Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics 50

48 Outdoor Wired No common infra structure available; some initiatives via light poles or other relatively dense infra Wireless City WiFi 4G/5G: LTE adaptation, LongRange low power WAN technologies Indoor Standard wired infra structure using UTP, fiber, switches, bridges and routers WiFi Bluetooth IEEE based technologies 51

49 Typical tradeoffs are among communication range, data rate, transceiver power and spectrum usage As a rule of thumb, Tradeoffs Increasing range decreases data rate (fix power, use modulation that can be demodulated farther away) Increasing range increases power use (fix modulation and data rate) Increasing power increases data rate (can go to higher modulation with the same error rate) increasing spectrum usage (spreading) increases range and decreases power Note: sketched dependencies are not automatic but require changes in encoding and modulation schemes. Outdoor IoT: long range, low data rate, low power 52

50 Long range: LoRaWAN Picture from LoRa whitepaper on lora-alliance.org 53

51 LoRaWAN (Long Range Wireless WAN), by LoRa Alliance topology: star, IP-connected (L2, act as transparent bridge) gateways single-hop wireless towards sensors physical layer: CHIRP, spread spectrum, wideband (Semtech patent) distinct frequencies Aloha based MAC (just send) bitrate: Adaptive Data Rate, managed by gateway, 0.3kbps 50kbps trading range for bitrate Long range: LoRaWAN device types class A one uplink, two downlink packets device initiated, aloha-like class B: add extra scheduled receive slots class C: always on services geolocation Identification and security Unique Network key (EUI64), ensure security on network level Unique Application key (EUI64) ensure end to end security on application level Device specific key (EUI128) 54

52 From link-labs site Scalability, up to 120 All gateways and nodes use the same channels for all transmissions. Time on air can be quite long. (up to 2 seconds) All uplink transmissions are uncoordinated (Pure Aloha) All gateway transmissions (Acknowledgement and downlink traffic) take the gateway off the air, unbeknownst to nodes trying to transmit. SX1301 based LoRa gateways have only 8 receiver modems to process simultaneous traffic. Improvements Frequency Block Hopping Dynamic Transmit Power and Spreading Factor Selection Synchronous Uplink Slotting Variable Uplink/Downlink Time Boundary Compressed Acknowledgements Quality of Service Listen before talk 55

53 LTE (4G), by 3GPP LTE IoT network: Integrated with the normal 4G network LTE-M(TC) machine type communication end-point negotiated wakeup scheme extended discontinuous repetition, DRX small 1.4MHz assigned bandwidth fraction simplifies receivers Narrowband LTE-MTC further limit the bandwidth to 200KHz 200kpbs down/144kpbs up NB-IoT DSSS (direct-sequence spread spectrum less complex receivers interferes with regular LTE, in principle Since October 2016, NB-IoT is actually deployed 56

54 New low power WAN: NB-FI WAVIoT: Narrowband Fidelity starting at 8bps (!) Further similar issues as LoRa trade range for data rate has some APIs and protocols some sample installations, Seems to make the standard error of implementing the entire OSI stack rather than connecting to IP 57

55 from (November 2017, unverified) 58

56 Physical organization IP The IEEE local area networks Techniques for medium sharing Techniques for energy reduction Wide area IoT-oriented initiatives Metrics Overview 59

57 Metrics (which is how to judge all this) throughput number of bytes per time unit for a station: bytes per interval latency or delay jitter time difference in initiation of a transmission and the start of the receipt consists of processing delay, transmission delay and queueing delay variations in timing, e.g. delay jitter, throughput jitter fairness, ability to prioritize fairness: bound on delay in access to a transmission channel or fair share in competition overhead scalability as utilization increasing the amount of communication increasing # stations e.g. CSMA/CA scales badly when increasing # stations while TDMA scales well as dimensioning predictability reliability LoRaWan can scale the number of gateways with the number of low-power nodes e.g. resilience agains interference power range 60

58 Qualitative metrics +: improves (e.g. Latency + means improves (reduces) Latency) -: makes worse o: no effect/not applicable 61

59 What are IoT networks? Guiding questions What is the role of IP? What techniques are used? techniques for media sharing techniques for reducing energy use Which standards are considered? 62

Internet of Things 2017/2018

Internet of Things 2017/2018 Internet of Things 2017/2018 The Things Johan Lukkien John Carpenter, 1982 1 Guiding questions What to think about things and how are they connected? 2 Resource limitations Memory: available flash ( program

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision

More information

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra Medium Access Control in Wireless IoT Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

Low Power Wide Area Network (LPWAN) Presented By: Dr. Hafiz Yasar Lateef Director, Telxperts Pty Ltd.

Low Power Wide Area Network (LPWAN) Presented By: Dr. Hafiz Yasar Lateef Director, Telxperts Pty Ltd. Low Power Wide Area Network (LPWAN) Presented By: Dr. Hafiz Yasar Lateef Director, Telxperts Pty Ltd. Low Power Wide Area Network (LPWAN) q Low-Power WAN Technologies are designed for machine-to-machine

More information

Medium Access Control in Wireless Networks

Medium Access Control in Wireless Networks Medium Access Control in Wireless Networks Prof. Congduc Pham http://www.univ-pau.fr/~cpham Université de Pau, France MAC layer Routing protocols Medium Acces Control IEEE 802.X MAC GSM (2G) Channels Downlink

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Smart test and certification of wireless IoT devices

Smart test and certification of wireless IoT devices Smart test and certification of wireless IoT devices Joerg Koepp IoT Market Segment Manager COMPANY REST RICT ED Connecting Billions of Devices to the Internet of Things (IoT) short range WWAN other Wireless

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Internet Structure. network edge:

Internet Structure. network edge: Midterm Review Internet Structure network edge: Hosts: clients and servers Server often in data centers access networks, physical media:wired, wireless communication links network core: interconnected

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Medium Access Control

Medium Access Control Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless

More information

EL2745 Principles of Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

Advanced Networking Technologies

Advanced Networking Technologies Advanced Networking Technologies Chapter 4 Medium Access Control Protocols (Acknowledgement: These slides have been prepared by Prof. Dr. Holger Karl) Advanced Networking (SS 16): 04 Medium Access Control

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

CS 332 Computer Networks Wireless Networks

CS 332 Computer Networks Wireless Networks CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Lecture 17: Wireless Networking"

Lecture 17: Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea http://usn.konkuk.ac.kr/~jskim 1 IEEE 802.x Standards 802.11 for Wireless Local Area Network 802.11 legacy clarified 802.11 legacy

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Topic 02: IEEE

Topic 02: IEEE Topic 02: IEEE 802.15.4 Tuesday 20 Feb 2007 ICTP-ITU School on Wireless Networking for Scientific Applications in Developing Countries Bhaskaran Raman Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/

More information

Eclipse IOT day April 3016 LoRa Overview. Wyres SAS 2016

Eclipse IOT day April 3016 LoRa Overview.  Wyres SAS 2016 Eclipse IOT day April 3016 LoRa Overview brian.wyld@wyres.fr www.wyres.eu Wyres SAS 2016 Contents LoRa objectives LoRa PHY overview Licenses / State regulation LoRa MAC : LoRaWAN Other MAC protocols Technology

More information

Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR

Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR R ETHINKING SENSING TECHNOLOGY About Beanair (1/2) Designer and manufacturer of Wireless Sensor Networks Embedded measurement Process

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless CS/ECE 439: Wireless Networking MAC Layer Road to Wireless Multiple Access Media Media access Controlling which frame should be sent over the link next Easy for point-to-point links; half versus full duplex

More information