Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )
|
|
- Kory Simon
- 6 years ago
- Views:
Transcription
1 Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the end of each question; use extra sheets if necessary (put your name on them) You may write your answers in English or in French. The total number of points (65) corresponding to the proposed questions is higher than the number of points (50) required to obtain the highest mark. Let p be the number of points you obtain; your final mark to this exam will be min(6, (1 + p/10)). This document contains 13 pages. Student First name: Last name: (answers to the questions are shown in italic and blue)
2 1 WLANs (30 points) 1.1 IEEE (10 points) Consider the following scenario: S1 D S2 S1 and S2 send CBR / UDP traffic to the common destination D, using IEEE (DCF) Scenario 1: Consider S1, S2 and D all within receive range of each other a) When the basic scheme is used (no RTS/CTS): Describe a collision (what happens before, during, and after) S1 D DIFS SIFS ACK DIFS bkf = rand(doubled CW) SIFS ACK Time S2 What does the collision probability depend on? Contention window size Packet rate (but not packet size) Number of stations Consider the total channel capacity to be X b/s. S1 and S2 send data flows at rates Y 1 = Y 2 > X. How is the channel capacity shared between S1 and S2? S 1 X/2 S 2 X/2 2
3 b) When RTS/CTS is used What are the changes to the previous answers? Comment also on the throughput and fairness. Channel is still equally shared with more overhead (throughput decreases) Shorter collision duration Scenario 2: Consider that S1 and S2 are hidden from each other, only D hears both (S1 cannot even sense S2, and vice versa) a) When the basic scheme is used (no RTS/CTS): What are the changes to the previous answers? Collision probability depends also on the packet size Throughput decreases considerably throughput S1 = throughput S2 = X /2 << X/2 b) When RTS/CTS is used What are the changes to the previous answers? Collision probability does not depend on the packet size anymore, but on the (fixed) RTS packet size throughput S1 = throughput S2 = X /2 < X/2, and X /2 > X /2 3
4 1.2 UDP and TCP over IEEE (13 points) Consider the following scenario: S Mb/s AP MS Mb/s MS where S0 is a station wire-connected to the access point (AP). MS1 and MS2 are wireless nodes associated to the AP, using IEEE (DCF basic mode, i.e. no RTS/CTS). The cable capacity is 10 Mb/s, the total wireless channel capacity is 2 Mb/s. Note that all downlink flows share the same queue at the AP. Scenario 1: Consider the channel to be clear (no noise). S0 sends 1 CBR/UDP flow to MS1 at 5 Mb/s, and 1 CBR/UDP flow to MS2 at 5 Mb/s. (Both flows go through the AP) What is the throughput and packet drop rate for each flow? Throughput = 1 Mbps, drop rate = 4 Mbps (or, more precisely) Throughput = 0.8 Mbps, drop rate = 4.2 Mbps What is the probability of a collision on the radio channel? Explain why. P(collision) = 0, i.e. no collisions, since only the AP is transmitting 4
5 Scenario 2: S0 sends 1 CBR/UDP flow to MS1 at 5 Mb/s, and 1 CBR/UDP flow to MS2 at 5 Mb/s, (both flows go through the AP). The channel between the AP and MS2 has a high error rate. Comment on the throughputs received at MS1 and MS2. Compare them to the result of Scenario 1. T hroughput S2 << 1Mbps T hroughput S1 < 1Mbps, because of sharing the queue, waiting for the retransmissions to MS2 to take place. Scenario 3: The channel is clear, S0 sends TCP packets to MS1 only (via the AP). Using the notations in the legend for different TCP, IP and MAC packets, describe one cycle of packet exchange using the following figure: S0 AP MS1 IP[ TCP[data] ] DIFS+backoff MAC(IP(...)) MAC ACK SIFS MAC(IP(TCP ACK)) DIFS+backoff SIFS MAC ACK IP(TCP ACK) Time Legend TCP[data] TCP ACK IP[... ] MAC[... ] MAC ACK 5
6 Compare the throughput to that of Scenario 2. T hroughput < 2Mbps, because of the overhead and because of the collisions between the AP (data) and MS1 (ACKs) What is the packet drop rate? 0, because TCP adapts to the available data rate Scenario 4: The channel is clear, S0 sends 1 TCP flow to MS1 and 1 TCP flow to MS2, (both flows go through the AP). Describe a collision (on the wireless channel) in this case, followed by a successful transmission, using the following figure: Time S0 AP SIFS DIFS bkf = rand(doubled CW) MS1 ACK TCP ACK MS2 Scenario 5: Since TCP (at S0) is unable to distinguish if a packet was dropped because of congestion at the AP or on the wireless channel, one possible solution is to install a TCP proxy at the AP, that sends back TCP-ACKs whenever a packet is successfully received from the wired part, and forwards the packet on the wireless channel. What are the advantages? TCP will not retransmit in case of channel packet loss, MAC will do it faster than TCP would do. TCP does not perform congestion control when loss is on the channel (not necessarily congestion). 6
7 What are the drawbacks? TCP will adapt to the wired link capacity, which has a higher data rate than what can be handled at the wireless channel (which needs an infinite queue length) 1.3 On the vulnerabilities of IEEE (7 points) Why is SIFS shorter than DIFS? To give priority to ACKs, which must be transmitted before any new data packet. To increase his share of the throughput, a cheater may use the following cheating methods in IEEE : The cheater sends his frame before the end of DIFS The cheater uses contention windows smaller than those specified in the standard Questions: Which one is more efficient? Why? DIFS. It gives the cheater absolute priority (like the priority SIFS gives to ACKs) Which one is easier to detect? Why? DIFS. Small contention windows give statistical transmission successes, while DIFS gives absolute transmission success. 7
8 2 Cellular Networks (15 points) 2.1 Cellular principles What is the difference between multiple access (e.g., FDMA) and duplex (e.g., FDD)? (2 points) Multiple access allows a number of users to access a single radio-frequency (RF) channel without interference. Duplex allows both ends of a communication channel to send and receive signals at the same time. Is it possible to have soft handover in GSM? Why? (2 points) No. Because in GSM, which uses TDMA instead of CDMA, a handset cannot communicate with more than one base station at the same time. Explain in a few sentences what the near/far effect is and how it is coped with in cellular networks. (2 points) Near/far effect is a problem specific to CDMA-based cellular networks. If there is more than one active user, the interference power with respect to a given user (reference user) at the base station is the transmitted power of other users (non-reference users) suppressed by a factor depending on the code used by the CDMA system. However, if some non-reference users are closer to the base station than the reference user, it is possible that the interference caused by these non-reference users (however suppressed) has more power than the reference user. As a result, the SIR of the reference user becomes too lower to allow correct reception. Control the transmission power of each user such that the received power at the base station is equal for all user is a solution. Consider a cellular network with a given propagation loss exponent α; describe two ways to achieve a certain minimum required SIR? (3 points) Determine a co-channel reuse ratio Q = 3N. Note that a larger Q implies a larger cluster size and less channels assigned to each cell. Use sectoring technique to further divide a cell into multiple sectors. This means that the usage of directional antennae and a sacrifice of trunk efficiency within a cell. 8
9 2.2 Capacity of Cellular Systems Assume that in a FDMA cellular system, a minimum SIR of 17dB is required for satisfactory downlink channel performance. Given a propagation loss exponent α = 4, propose three frequency reuse patterns for the system. Note that the cluster size N should be the least integer that satisfies the minimum required SIR; choosing an unreasonably large N will not be considered as a solution (Hint: partitioning a cell into three 120 o sectors is not the only feasible way to do sectoring). (6 points) S No sectoring I = ( D R )4 1 6 (i.e., there are 6 co-channel interference cells). 120 S sectoring I = ( D R )4 1 2 (i.e., there are 2 co-channel interference cells). 60 S sectoring I = ( D R )4 (i.e., there is only 1 co-channel interference cell). The requirement is that: S 17dB = I So, considering that ( D R )4 = 9N 2 and N can only take values of 1, 3, 4, 7, 9,, we have: 7 no sectoring N = sectoring 3 60 sectoring 9
10 3 Ad hoc networks (20 points) 3.1 Throughput (6 points) In static multi-hop ad hoc networks, the maximal throughput decreases approx. with N, where N is the number of nodes in the network. a) Explain precisely which throughput decreases at that rate. The throughput that decreases at that rate is the throughput of the end-to-end traffic between randomly chosen sources and destinations. b) Explain the intuition behind this throughput decrease. In an ad hoc network, nodes that are sufficiently distant can transmit concurrently. Therefore the total amount of data that can be simultaneously transmitted for one hop increases linearly with the total area of the ad hoc network. If node density is constant, this means that the total one-hop capacity is O(n), where n is the total number of nodes. However, as the network grows larger, the number of hops between each source and destination may also grow larger, depending on communication patterns. One might expect the average path length to grow with the spatial diameter of the network, equivalently the square root of the area, i.e., O( n). With this assumption, the total end-to-end capacity is roughly O(n/ n), and the end-to-end throughput available to each node is O(1/ n). c) Explain how each of the following situations influences throughput: (i) The message sources and destinations are necessarily neighbors If the message sources and destinations are neighbors, all the communications are single-hop and the throughput is high. (ii) The nodes send video traffic at a constant rate to randomly chosen destinations If destinations are chosen at random, the communications may be multi-hop, which decreases the end-to-end throughput. Furthermore, the video traffic assumes streaming, which induces more interference, more collisions and therefore low end-to-end throughput. 10
11 (iii) The nodes communicate by occasionally sending messages (e.g., SMS) to randomly chosen destinations. As explained previously, multi-hop communications decrease end-to-end throughput. However, occasional traffic leads to less interference and collisions than in the previous case; the end-to-end throughput is therefore higher than for the previous case. (iv) Nodes are mobile, but the application is not latency-sensitive. If the application is not latency-sensitive, this means that buffering and retransmissions are possible. Therefore, the throughput is expected to be high. 3.2 Routing (6 points) Today s mainstream proposals for ad hoc network routing are DSR and AODV protocols. a) Would it be efficient to make use of AODV or DSR protocols for routing in today s Internet? If Yes, explain how. If No, explain why. No. Indeed, the Internet is a wired network where the majority of the nodes are static and where the quantity of information exchanged is very important; a reactive routing protocol such as AODV and DSR is therefore not suitable for this kind of network. 11
12 b) Assume that you need to implement a messaging service in a mobile ad hoc network in which each user is sending messages at a rate of 1 message/10 minutes. Would you use AODV or DSR for message routing? Explain why and how. If Yes, explain how. If No, what would be your other proposals? There is no need to establish a route between the source and the destination if the message sending frequency is low (1 message/10 minutes). Indeed, both AODV and DSR flood the network with requests in order to get routes to a given destination. However, the returned route will be used to send only one packet (the route will most likely be stale after 10 minutes), which makes no sense. An alternative solution would be to flood the network with the message to be sent; the message will eventually reach the destination and the cost of the solution is lower than the cost of AODV or DSR. 3.3 Security (8 points) a) How would you explain the fact that Mobility breaks the security-routing dependency cycle? Are there other techniques by which the security-routing dependency cycle can be avoided? To establish a security association between nodes A and B, we don t rely on multi-hop routes (which leads to the security-routing dependency cycle), we rather establish it when A and B are within the power range of each other; mobility increases the probability of encounter between the two entities. Other techniques can be used to avoid the security-routing dependency cycle (Preloading all pairs of keys into nodes, On-line authentication servers,...). 12
13 b) Why is security important for routing? Describe one simple attack by which a single malicious node can disable all communication of its neighbors. If the routing protocol is not secure, an attacker can easily disrupt the communications in the ad hoc network. E.g., by sending forged routing packets, an attacker could route all packets for some destination to itself and then discard them. This attack is called Black hole attack. c) Consider an ad hoc network running a DSR protocol. If all nodes in the network share pairwise keys, and if all mutual communication between nodes is encrypted with the keys that they share (both packet headers and payload), does this make the network resistant to attacks? If yes, explain how. If no, describe the attacks that you believe can harm the network routing protocol operation. No. Indeed, even if all nodes in the network share pairwise keys, the Black hole attack described above is still possible. 13
Wireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function
More informationWireless Network Security Spring 2012
Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationSample solution to Midterm
College of Computer & Information Science Spring 2007 Northeastern University Handout 10 CSG250: Wireless Networks 27 February 2007 Sample solution to Midterm Part I (4 4 = 16 points) 1. Explain how the
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationDOMINO: A System to Detect Greedy Behavior in IEEE Hotspots
DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationLogical Link Control (LLC) Medium Access Control (MAC)
Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationConcurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs
Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationCSE 6811 Ashikur Rahman
Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationWireless TCP Performance Issues
Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the
More informationCDMA-Based MAC Protocol for Wireless Ad Hoc Networks
CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationCS244a: An Introduction to Computer Networks
Grade: MC: 7: 8: 9: 10: 11: 12: 13: 14: Total: CS244a: An Introduction to Computer Networks Final Exam: Wednesday You are allowed 2 hours to complete this exam. (i) This exam is closed book and closed
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationCOMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)
COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) Question 1 (X marks) (a) The one-way propagation delay between A and B is 100/1 = 100 seconds. The RTT will be
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationAn Implementation of Cross Layer Approach to Improve TCP Performance in MANET
An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2
More informationCHAPTER 7 SIMULATION OBSERVATIONS
CHAPTER 7 CHAPTER 7 SIMULATION OBSERVATIONS Over a randomly distributed wireless network system with the specification is modeled with the suggested algorithms for communication from a selected source
More informationA Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationIntroduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II
Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11
More informationCollisions & Virtual collisions in IEEE networks
Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing
More informationStrategies and Guidelines for Improving Wireless Local Area Network Performance
Strategies and Guidelines for Improving Wireless Local Area Network Performance Dr Nurul Sarkar Associate Professor School of Computing and Mathematical Sciences nurul.sarkar@aut.ac.nz 2 Outline of Talk
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More informationTransport layer issues
Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc
More informationMobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.
More informationStudent ID: CS457: Computer Networking Date: 5/8/2007 Name:
CS457: Computer Networking Date: 5/8/2007 Name: Instructions: 1. Be sure that you have 10 questions 2. Write your Student ID (email) at the top of every page 3. Be sure to complete the honor statement
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationWireless Mesh Networks
Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationComputer Science 461 Final Exam May 22, :30-3:30pm
NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationPerformance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *
Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationComputer Networks (Fall 2011) Homework 2
5-744 Computer Networks (Fall 20) Homework 2 Name: Due: Oct. 2th, 20, 3:00PM (in class) Andrew ID: October 2, 20 A Short Questions. Which of the following is true about modern high-speed routers? A. A
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationOverview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi
Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some
More informationSample Solution to Problem Set 3
College of Computer & Information Science Fall 2007 Northeastern University Handout 6 CSG250: Wireless Networks 25 October 2007 Sample Solution to Problem Set 3 (The problem numbers from the text are the
More informationLink Layer II: MACA and MACAW
Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet
More informationRemarks On Per-flow Differentiation In IEEE
Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,
More informationPerformance anomaly of b
Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel
More informationAttacks on WLAN Alessandro Redondi
Attacks on WLAN Alessandro Redondi Disclaimer Under the Criminal Italian Code, articles 340, 617, 617 bis: Up to 1 year of jail for interrupting public service 6 months to 4 years of jail for installing
More informationUNIT 1 Questions & Solutions
UNIT 1 Questions & Solutions 1. Give any 5 differences between cellular wireless networks and ADHOC wireless network. Ans: The following table shows the difference between cellular networks and Adhoc wireless
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationOutline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD
Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationCHAPTER 4 CROSS LAYER INTERACTION
38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.
More informationIntroduction to IEEE
Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationB. Bellalta Mobile Communication Networks
IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationIssues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study
Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationIEEE Technical Tutorial. Introduction. IEEE Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
More informationFinal Exam for ECE374 05/03/12 Solution!!
ECE374: Second Midterm 1 Final Exam for ECE374 05/03/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam.
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationCSCI Spring Final Exam Solution
CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and
More informationCWNP PW Certified Wireless Analysis Professional. Download Full Version :
CWNP PW0-270 Certified Wireless Analysis Professional Download Full Version : http://killexams.com/pass4sure/exam-detail/pw0-270 QUESTION: 50 ABC Company is having VoWiFi latency problems on their 802.11g
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationDelivering Voice over IEEE WLAN Networks
Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet
More information