MSIT 413: Wireless Technologies Week 8
|
|
- Gavin Whitehead
- 5 years ago
- Views:
Transcription
1 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017
2 The Multiple Access Problem How can multiple mobiles access (communicate with) the same base station? Frequency-Division (AMPS) Time-Division (IS-136, GSM) Code-Division (IS-95, 3G) Direct Sequence/Frequency-Hopped Orthogonal Frequency Division (WiMax, 4G) Random Access (802.11, wireless data)
3 Random Access Access Point (AP) Station A Station C Station B Terminals send/receive messages (packets) to/from the AP at random times (i.e., when they appear).
4 Medium Access Control (MAC) Fixed assignment access Each user is assigned a dedicated channel, time slot, or code Appropriate for circuit-switched traffic, transferring long data files Random access: users contend for access to the channel Users may collide, losing packets. Sometimes can negotiate rate (bandwidth, time slots, codes) and power Widely used in wired networks Used in WiFi, and in cellular networks for requesting channel/time slot/code
5 Cellular Call Setup (Random Access) 1. Call Request 2. Send numbers to switch 3. Page Receiver 4. Request Channel/Time slot/code
6 ALOHA-Based Random Access Packet arrives transmit Collision? no Base station Sends ack yes Transmitter does not Receive ack Packet is rescheduled With random delay Simple: asynchronous Low throughput under heavy loads (maximum is 18% of incoming packets) Slotted ALOHA Synchronous, maximum throughput increases to 36% Used in GSM to reserve a time slot for voice connection Reservation ALOHA Contention period followed by reserved message slots
7 ALOHA Protocols
8 Carrier Sense Multiple Access (CSMA) Packet arrives Sense channel Busy? no Transmit packet yes Delay transmission (non-persistent) Listen before talk (LBT) protocol How do collisions occur?
9 Carrier Sense Multiple Access (CSMA) Packet arrives Sense channel Busy? no Transmit packet yes Delay transmission (non-persistent) Listen before talk (LBT) protocol Collisions occur if transmitters cannot sense the other transmission (e.g., due to large propagation delay) Lower probability of collision/higher throughput than ALOHA Long propagation times è more collisions ALOHA preferred for wide area applications
10 CSMA Example
11 Collision Detection: Worst-Case Delay Station A t=0 Station B Propagation delay T = distance / c A starts transmitting at time 0
12 Collision Detection: Worst-Case Delay t=0 t < T Station B Station A Propagation delay T = distance / c A starts transmitting at time 0 B starts transmitting just before time T (channel is clear)
13 Collision Detection: Worst-Case Delay Station A t=0 t < T B senses collision at time T Station B A starts transmitting at time 0 B starts transmitting just before time T (channel is clear) B hears A just after it starts to transmit.
14 Collision Detection: Worst-Case Delay t=0 t < T Station B Station A B senses collision at time T A starts transmitting at time 0 B starts transmitting just before time T (channel is clear) B hears A just after it starts to transmit. B s initial transmission travels back to A
15 Collision Detection: Worst-Case Delay Station A t=0 t < T A senses collision at time 2T Station B A starts transmitting at time 0 B starts transmitting just before time T (channel is clear) B hears A just after it starts to transmit. B s initial transmission travels back to A A senses a collision at time 2T
16 Maximum Separation Station B Station A Propagation delay T = distance / c Worst-case delay before collision is detected is 2T As T increases, probability of collision increases, more bits can be lost during a collision Imposes maximum separation between stations b: maximum separation between station and router is 100 M T = 200/c = 2/3 microsecond Data rate 11 Mbps è maximum of 16 bits are lost in collision
17 Carrier Sensing Nonpersistent: After sensing a busy channel, the terminal senses the channel after a random waiting period Persistent: The terminal senses the channel until the channel becomes free. 1-Persistent: After the channel becomes free, the terminal transmits immediately. p-persistent: The terminal transmits with probability p.
18 Binary Exponential Backoff Packet arrives transmit Collision? no Base station Sends ack yes Transmitter does not Receive ack Packet is rescheduled After R time slots R is random Maximum of 16 retries Time slot 2 x (maximum round trip delay) After 1 st collision: R=0 or 1 with equal probability After 2 nd collision: R=0,1,2, or 3 with equal probability After i th collision (i=1,,10): R is selected between 0 and 2 i -1
19 Performance Throughput (S): Average number of successful packet transmissions per unit time. Normalized throughput: Percentage of successful packet transmissions (per time slot or time unit) Average Delay (D): Average waiting time before successful transmission Offered Traffic (G): Number of packet transmission attempts per packet time slot includes both new arrivals and retransmissions. Performance depends on the propagation delay across the network relative to the packet duration.
20 Throughput vs. Offered Load Slotted non-persistent CSMA non-persistent CSMA Throughput Slotted Aloha p-persistent CSMA Aloha Offered load
21 Throughput vs. Offered Load Slotted non-persistent CSMA non-persistent CSMA Throughput 18% Aloha Slotted Aloha p-persistent CSMA 0.5 Offered load
22 Delay vs. Throughput Delay Throughput
23 CSMA with Collision Detection (CSMA/CD) Nodes detect a collision in progress, and stop transmitting before the entire packet is transmitted. Assumes nodes can hear each other when they are transmitting. Appropriate for wired channels. Problems with wireless channels: Nodes cannot transmit and receive at the same frequency at the same time. Not all nodes may be in range of each other.
24 Hidden Terminal Problem Station A Station B Station D Station C A is transmitting to B. C wants to transmit to D.
25 Hidden Terminal Problem Coverage area for station C. Station A Station B Station D Station C A is transmitting to B. C wants to transmit to D. C may not sense A s transmission, causing a collision at B.
26 Example: Cognitive Radio Primary users of spectrum share with secondary users Secondary users cannot disrupt primary service Proposed for TV white space unused TV channels available for secondary use TV transmitter TV receiver
27 Exposed Terminal Problem Station A Station B Station D Station C B is transmitting to A. C wants to transmit to D
28 Exposed Terminal Problem Coverage area for station C. Station A Station B Station D Station C B is transmitting to A. C wants to transmit to D. C senses B s transmission, and does not transmit even though it would not cause interference at A.
29 Basic Problem Carrier sensing determines whether or not there are interfering sources near the transmitter, whereas we want to know if there are active receivers nearby.
30 Solutions Busy-tone multiple access (BTMA) Separate control channel used to indicate that the channel is idle or busy. An active station transmits a busy tone on the control channel. Each receiver that senses a busy tone turns on its own busy tone. Used in ad hoc networks. Digital or Data Sense Multiple Access (DSMA) Used in FDD cellular mobile data networks Forward channel periodically broadcasts a busy/idle bit for the reverse link. Mobile transmits if bit is in idle state; base station sets bit to busy. Not carrier sensing: sensing is performed after demodulation. Multiple Access with Collision Avoidance (MACA)
31 Hidden Terminal Problem Station A Station B Station D Station C A is transmitting to B. C wants to transmit to D.
32 Revealing the Hidden Terminal Station A RTS Station B Coverage area for station C. Station D Station C A first sends a Request to Send (RTS) packet to B.
33 Revealing the Hidden Terminal CTS Coverage area for station C. Station A Station B Station D Station C A sends a Request to Send (RTS) packet to B. B sends a Clear to Send (CTS) packet to A; heard by C!
34 Revealing the Hidden Terminal data Coverage area for station C. Station A Station B Station D Station C A sends a Request to Send (RTS) packet to B. B sends a Clear to Send (CTS) packet to A; heard by C! C is silent for duration of A s transmission (specified in CTS)
35 Revealing the Hidden Terminal Coverage area for station C. Station A Station B Station D Station C What if C hears RTS, but not CTS?
36 Exposed Terminal Station A RTS Station B Coverage area for station C. Station D Station C C will not hear the CTS from A.
37 RTS Collision Station A RTS Station B Station E RTS Station C RTS messages from E and B collide à exponential backoff
38 Corrupted CTS Station A CTS Station B Station E Data, RTS, or CTS Station C CTS message from A is corrupted due to interference from E à exponential backoff by B
39 MACA Protocol (RTS/CTS) Transmitter Receiver Request to Send (RTS), packet length Clear to Send (CTS), packet length Data Ack Terminals receiving either an RTS or CTS must not transmit for the duration of the packet. (What if the terminal hears RTS but not CTS?) Collision occurs if multiple nodes transmit an RTS, or the CTS is not heard due to other interference. Collision è binary exponential back-off
40 Wireless Local Area Networks (WLANs) Low mobility, high data rates within confined region (building or campus) Competitive with other wireless data systems (4G, fixed wireless access) Unlicensed bands Industrial, Scientific, Medical (ISM): 2.4 GHz National Information Infrastructure (UNII): 5 GHz Must accept interference, therefore uses spread spectrum signaling, or random access with collision avoidance. 40
41 Range-Rate Tradeoff WWAN IEEE Range WMAN WLAN WPAN ZigBee Bluetooth IEEE WiMax IEEE WiFi a c Data Rate (Mbps) 41
42 Overview of Standard IEEE GHz 850 to 950 nm FHSS DS-SS Diffuse IR 2 Mbps 4GFSK 1 Mbps 2GFSK 2 Mbps DQPSK 1 Mbps DBPSK IEEE b Extension 5.5 Mbps DQPSK-CCK 11 Mbps DQPSK-CCK 42
43 Overview of Standard IEEE discontinued 2.4 GHz 850 to 950 nm FHSS DS-SS Diffuse IR 2 Mbps 4GFSK 1 Mbps 2GFSK 2 Mbps DQPSK 1 Mbps DBPSK IEEE b Extension discontinued 5.5 Mbps DQPSK-CCK 11 Mbps DQPSK-CCK 43
44 802.11b vs g b g Ghz Interference from Microwave, Bluetooth 3 non-overlapping channels Max Speed 11 Mbps Direct Sequence Spread Spectrum (DSSS) CSMA/CA same same channels 6 to 54 Mbps via OFDM 5.5 and 11 Mbps via DSSS CSMA/CA 44
45 802.11g vs a g a Ghz Interference from Microwave, Bluetooth 3 non-overlapping channels 6 to 54 Mbps via OFDM fallback to DSSS CSMA/CA Indoor/outdoor range: 38m/140m 5 Ghz range 5 channels Max Speed 54 Mbps Orthogonal Frequency Division Multiplexing (OFDM) CSMA/CA Shorter range 45
46 802.11g vs n g n Ghz Interference from Microwave, Bluetooth 3 non-overlapping channels (20 MHz) 6 to 54 Mbps via OFDM fallback to DSSS CSMA/CA Indoor/outdoor range: 38m/140m 2.4 or 5 Ghz MIMO enhancement to 11g/11a Rates (20 MHz/40MHz): 72.2 / 150 Mbps per MIMO stream Up to 4 MIMO streams Indoor/outdoor range: 70m / 250m 46
47 Peer-to-Peer (Ad Hoc) Configuration Single Cell Station A Station C Station B Mobile devices are referred to as Stations. Each Station can communicate directly with another Station. System referred to as Independent Basic Service Set (IBSS) 47
48 Infrastructure Configuration Access Point Single Cell Station A Station C Station B Access Point is analogous to a cellular Base Station System referred to as Infrastructure Basic Service Set (BSS) 48
49 Extended BSS (EBSS) Configuration Distribution System (DS) BSS Connect APs via a wired network System referred to as Extended BSS APs have a BSSID System has a SSID Basic Service Set 49
50 Association/Disassociation Active scanning: laptop scans different frequencies Passive scanning: laptop waits for beacon on a particular frequency 50
51 Association/Disassociation Probe Request 51
52 Association/Disassociation Probe Request Probe Response 52
53 Association/Disassociation Probe Request Probe Response Authenticate 53
54 Association/Disassociation Probe Request Probe Response Authenticate Associate Request 54
55 Association/Disassociation Probe Request Probe Response Authenticate Associate Request Associate Response 55
56 Association/Disassociation Probe Request Probe Response Authenticate Associate Request Associate Response Disassociate (No ack) 56
57 802.11b: Physical Layer CCK (Complementary Code Keying): Each 8-bit symbol is mapped to 8 four-phase (QPSK) symbols. 57 The signatures (codes) are orthogonal.
58 Protocol Architecture Logical link control Contention-free service Contention service MAC Layer Point Coordination Function (PCF) Distributed Coordination Function (DCF) Air interface (802.11/11a/11b/11g) 58
59 Protocol Architecture Logical link control Contention-free service Contention service MAC Layer Point Coordination Function (PCF) Distributed Coordination Function (DCF) Air interface (802.11/11a/11b/11g) PCF: Point Coordination Control Function (infrastructure) 59
60 Point Coordination Function (PCF) Access Point Single Cell Station A Station C Station B Access Point Becomes a Scheduler Contention Free Mode (TDMA) Optional MAC feature not widely available in products. 60
61 Protocol Architecture Logical link control Contention-free service Contention service MAC Layer Point Coordination Function (PCF) Distributed Coordination Function (DCF) Air interface (802.11/11a/11b/11g) PCF: Point Coordination Control Function (infrastructure) DCF: CSMA/CA with additional virtual carrier sensing (ad hoc) DCF is more prevalent; PCF and DCF can co-exist 61
62 Inter Frame Spacing (IFS) Station has to detect a minimum idle time before transmit Time depends on type of Frame, type of MAC SIFS: Short IFS (used by ACKs, CTS) PIFS: PCF IFS used by PCF Frames DIFS: DCF IFS used by DCF Frames SIFS < PIFS < DIFS Relative values of IFS used to prioritize Medium Access 62
63 CSMA/CA 63
64 Basic Access Method DIFS Contention window PIFS DIFS Busy medium SIFS Backoff window Next frame Slot time Time Defer access Select slot using binary exponential backoff 64
65 IEEE Medium Access Control Logic 65
66 Distributed Control Function (DCF) Network Allocation Vector: Prevents transmissions by other terminals. Virtual carrier sensing: RTS/CTS packets state the duration of the packet. All stations within range must remain silent during that period. 66
67 Frame Structure Frame Duration Addr 1 Addr 2 Addr 3 Sequence Addr 4 Data CRC Control Control Total Header Size 34 bytes Variable packet size 67
68 Frame Structure Frame Duration Addr 1 Addr 2 Addr 3 Sequence Addr 4 Data CRC Control Control Total Header Size 34 bytes Variable packet size Addr 1 to Addr 4: (Receiver/Transmitter Addresses; Source/Destination AP addresses) 68
69 Frame Structure Frame Duration Addr 1 Addr 2 Addr 3 Sequence Addr 4 Data CRC Control Control Total Header Size 34 bytes Variable packet size Addr 1 to Addr 4: (Receiver/Transmitter Addresses; Source/Destination AP addresses) Frame Control: indicates if frame is data, RTS, CTS, or other type of control. 69
70 Frame Structure Frame Duration Addr 1 Addr 2 Addr 3 Sequence Addr 4 Data CRC Control Control Total Header Size 34 bytes Variable packet size Addr 1 to Addr 4: (Receiver/Transmitter Addresses; Source/Destination AP addresses) Frame Control: indicates if frame is data, RTS, CTS, or other type of control. Duration: indicates time in microseconds that the channel will be allocated for transmission (virtual carrier sensing) 70
71 Frame Structure Frame Duration Addr 1 Addr 2 Addr 3 Sequence Addr 4 Data CRC Control Control Total Header Size 34 bytes Variable packet size Addr 1 to Addr 4: (Receiver/Transmitter Addresses; Source/Destination AP addresses) Frame Control: indicates if frame is data, RTS, CTS, or other type of control. Duration: indicates time in microseconds that the channel will be allocated for transmission (virtual carrier sensing) Sequence Control: identifies place in packet sequence for fragmentation and reassembly CRC: Cyclic Redundancy Check (for error detection) 71
72 Power Management Incoming data is buffered. To conserve power, mobile device is typically idle (does not listen for AP). 72
73 Power Management Beacon announces packet arrival. Incoming data is buffered. To conserve power, mobile device is typically idle (does not listen for AP). Wakes up at designated times to receive a burst. 73
74 Power Management Transmits packet(s). Incoming data is buffered. To conserve power, mobile device is typically idle (does not listen for AP). Wakes up at designated times to receive a burst. 74
75 Core Networking Functions Call setup Mobility management Handoff 75
76 Wireline Call Setup Switch wire pair Helen s phone off hook PSTN Information Flow network address Bob s phone 76
77 Wireline Call Setup Switch wire pair Helen s phone off hook dial tone PSTN Information Flow network address Bob s phone 77
78 Wireline Call Setup Switch wire pair Helen s phone off hook dial tone keystrokes PSTN Information Flow network address alert signal Bob s phone 78
79 Wireline Call Setup Switch wire pair Helen s phone off hook dial tone keystrokes ring indication PSTN Information Flow network address alert signal Bob s phone 79
80 Wireline Call Setup Switch wire pair Helen s phone off hook dial tone keystrokes ring indication remove ring indication PSTN Information Flow network address alert signal off hook Bob s phone 80
81 Wireline Call Setup Switch wire pair Helen s phone off hook dial tone keystrokes ring indication remove ring indication PSTN Information Flow conversation network address alert signal off hook Bob s phone 81
82 Cellular Call Setup 1. Call Request 82
83 Cellular Call Setup 1. Call Request 2. Send numbers to switch 3. Page Receiver 4. Request Channel 83
84 Cellular Call Setup (cont.) 5. Switch assigns channels 6. Cellular conversation is set up 84
85 Information Flow for Cellular Call 85
MSIT 413: Wireless Technologies Week 9
MSIT 413: Wireless Technologies Week 9 Michael L. Honig Department of EECS Northwestern University March 2017 Schedule for Today Finish discussion of random access Core networking; mobility management
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationChapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du
Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18
More informationOverview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV
Wireless networks 1 Overview Wireless networks basics IEEE 802.11 (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV 2 Wireless Networks Autonomous systems of mobile hosts connected by wireless
More informationIEEE Wireless LANs Part I: Basics
IEEE 802.11 Wireless LANs Part I: Basics Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationOverview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi
Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationIEEE MAC Sublayer (Based on IEEE )
IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationMobile Communications Chapter 7: Wireless LANs
Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy
More informationIEEE Wireless LANs
Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points
More informationIntroduction to IEEE
Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationWireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs
Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)
More informationCS 332 Computer Networks Wireless Networks
CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More information02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel
TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment
More informationWireless LAN. Access Point. Provides network connectivity over wireless media
LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationOverview of Wireless LANs
Wireless LANs Chapter 17 CS420/520 Axel Krings Page 1 Overview of Wireless LANs use wireless transmission medium issues of high prices, low data rates, occupational safety concerns, & licensing requirements
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 802.11 History and Standardization 802.11 Architectures and Layers 802.11 Frame Format and Addressing 802.11 Mac Layer (CSMA/CA) 2 Wifi 3 twisted pair
More informationLink Layer: Retransmissions
Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability
More informationOutline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD
Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationFunctions of physical layer:
Chapter 14 Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium Functions
More informationEnabling Technologies
Enabling Technologies Part 4 Mobile Ad Hoc Networking Wuhan University Why Enable? Reliable point-to-point communication via media access control (MAC) Challenges in medium share Categories of MAC protocols
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationWireless Communication Session 4 Wi-Fi IEEE standard
Wireless Communication Session 4 Wi-Fi IEEE802.11 standard M. Daneshvar Farzanegan Soourosh.blogfa.com smdanesh@yahoo.com 1 Reminder on frequencies and wavelenghts twisted pair coax cable optical transmission
More informationIEEE Technical Tutorial. Introduction. IEEE Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationHands-On Exercises: IEEE Standard
Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March
More informationInternet Protocol Stack
Internet Protocol Stack Application: supporting network applications FTP, SMTP, HTTP Transport: data transfer between processes TCP, UDP Network: routing of datagrams from source to destination IP, routing
More informationChapter 7: Wireless LANs
Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationWireless LANs and Ad-hoc networks. IFI Master - Ubinet G. Urvoy-Keller
802.11 Wireless LANs and Ad-hoc networks IFI Master - Ubinet G. Urvoy-Keller Sources of document Matthew Guast, 802.11 Wireless Networks, the definitive guide O'Reilly 2005. Matti Siekkinen, Aalto University
More informationPage 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs
EEC173B/ECS152C, Winter 2006 Wireless LANs Evolution of Technology & Standards IEEE 802.11 Design Choices Architecture & Protocols PHY layer MAC layer design Acknowledgment: Selected slides from Prof.
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless
More informationInvestigation of WLAN
Investigation of WLAN Table of Contents Table of Contents...1 ABBREVIATIONS...II 1 Introduction...3 2 IEEE 802.11...3 2.1 Architecture...3 2.2 MAC layer...4 2.3 PHY layer...9 2.4 Mobility in IEEE 802.11...12
More informationINTRODUCTION TO WIRELESS LAN, MAC PROTOCOLS and INTERFERENCE. Choong Seon Hong, KHU
INTRODUCTION TO WIRELESS LAN, MAC PROTOCOLS and INTERFERENCE cshong@khu.ac.kr, Choong Seon Hong, KHU Outline 2 Introduction Wireless LAN Architecture Wireless LAN standards Media Access Problem The IEEE
More informationAnnouncements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.
Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationLocal Area Networks. Lecture 17 Fall Token Ring and FDDI
Local Area Networks Lecture 17 Fall 2010 Token Ring and FDDI IEEE 802.5 Ring LAN Unidirectional ring network 4 Mbps and 16 Mbps on twisted pair Differential Manchester line coding Token passing protocol
More informationData and Computer Communications
Data and Computer Communications Chapter 17 Wireless LANs Eighth Edition by William Stallings Overview of Wireless LANs use wireless transmission medium Wireless LAN were little used issues of high prices,
More informationChapter 7: Wireless LANs
Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy
More informationCSCI-1680 Wireless Chen Avin
CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks
More informationWireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics Standards Technical Concepts Implementation Troubleshooting 802.11 timeline source: Anandtech
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationM06:Wireless and Mobile Networks. Corinna Schmitt
M06:Wireless and Mobile Networks Corinna Schmitt corinna.schmitt@unibas.ch Acknowledgement 2016 M06 2 Background q # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)!
More information