Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday
|
|
- Dortha Howard
- 5 years ago
- Views:
Transcription
1 ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui Adapted from Jim Kurose & Keith Ross (original copyright) Chapter 6, slide 20
2 Outline Wireless wireless characteristics multiple access schemes TDMA/FDMA CDMA Wi-Fi wireless LANs CSMA/CA IEEE Mobility principles: addressing routing to mobile users mobile IP Chapter 6, slide 21
3 IEEE : multiple access There are two access operating modes Infrastructure based mode Ad hoc based mode Chapter 6, slide 22
4 IEEE : multiple access There are two multiple access functions: Point Coordination Function (PCF) TDMA-like access Point Coordinator (PC) polls users in a roundrobin fashion No contention Synchronous Infrastructure mode Distributed Coordination function (DCF) CSMA-like access Random access: listenbefore-talk Contention-like medium Asynchronous Both infrastructure and adhoc modes Chapter 6, slide 23
5 IEEE multiple access Contention and contention free periods: CFP CP CFP CP Contention-Free Period (CFP) Synchronous traffic Point Coord. Fct (PCF) is the access method Contention Period (CP) Asynchronous traffic Distr. Coord. Fct (DCF) is the access method Access point alternates between CFP and CP modes Chapter 6, slide 24
6 IEEE DCF MAC one at a time: 2 + nodes send at same time => collision CSMA - sense before transmitting don t collide with ongoing transmission by other node no collision detection difficult to sense collision when transmitting due to weak sigl goal: avoid collisions: CSMA/C(ollision)A(voidance) use Acknowledgment mechanism to recover from collision C A B C A B A s signal strength C s signal strength space Two scenarios where collision cannot be detected Chapter 6, slide 25
7 IEEE DCF MAC Simple MAC if channel idle for SIFS=10 µsec then sender transmits frame receiver waits for SIFS=10 µsec and sends ACK SIFS sender receiver (SIFS stands for Short InterFrame Space, and allows HW to switch from rx to tx) data Challenges/issues (1) more than one communication higher collision rate (100%) (2) when collision occurs, it at least should not occur when ACK is being sent allow ACK to be sent successfully ACK SIFS Chapter 6, slide 26
8 IEEE DCF MAC Simple MAC w/ minor improvement if channel idle for DIFS=50 µsec then sender transmits frame receiver waits for SIFS=10 µsec only and sends ACK SIFS < DIFS ACK gains access before (DIFS stands for DCF InterFrame Space) sender DIFS data receiver Challenges/issues (1) sure, it now prevents collision between DATA & ACK (2) but collision can still occur between DATAs How to reduce collision even further? ACK SIFS Chapter 6, slide 27
9 IEEE DCF MAC MAC w/ backoff After medium sensed busy don t send right away wait for a random time, then transmit idea: different senders will hopefully pick different times to transmit so as to avoid colliding with each other again Chapter 6, slide 28
10 IEEE DCF MAC MAC w/ backoff After medium sensed busy DIFS DIFS W = contention window Medium busy Random counter Data ready Defer access Backoff counter b Transmit! contention window W: define new parameter W = 8, 16, 32, etc backoff counter b: pick a random number b from [0,W] E.g., if W = 64, perhaps b = 23 Decrement counter b by 1 every idle slot If someone else goes first, reset b but don t change W If counter reaches 0, transmit Chapter 6, slide 29
11 IEEE DCF MAC MAC w/ backoff After collision DIFS DIFS W = contention window Medium busy Random counter Collision? Defer access Backoff counter b Transmit! contention window W: define new parameter W = 8, 16, 32, etc backoff counter b: pick a random number b from [0,W] E.g., if W = 64, perhaps b = 23 Decrement counter b by 1 every idle slot If counter reaches 0, transmit If another collision, reset b & increase W Chapter 6, slide 30
12 IEEE DCF MAC MAC w/ backoff After collision DIFS DIFS W = contention window Medium busy Random counter Collision? Defer access Backoff counter b Transmit! Challenge How to choose W? lower W higher collision waste of bandwidth higher W lower collision but wasted, unused slots Solution: W should adapt/adjust to loads/# of users W increases as # of users increases and vice-versa Exponential Backoff Chapter 6, slide 31
13 IEEE DCF MAC MAC w/ exponentional backoff exponential backoff: (1) increase W when collision (2) decrease W when success This is how it works: set W = W 0 (this is an initial value) pick random backoff counter b from [0,W] transmit when counter reaches 0 if collision occurs, set W 2W (double window) and repeat Chapter 6, slide 32
14 IEEE DCF MAC MAC w/ exponentional backoff Example Initial window W 0 = 8 1 st collision: set W 1 =W 0 =8; pick b from [0,1,,7= W 1-1] 2 nd collision: set W 2 =2W 0 =16; pick b from [0,1,,15= W 2-1] m th collision: set W m =2 (m-1) W 0 ; pick b from [0,1,, W m -1] Maximum window size = W max = 2 (m-1) W 0 After m th collision, Window is set to W max For example: (m+1) th collision, W m+1 = W max at i th collision: W i = min {2 (i-1) W 0, W max } Chapter 6, slide 33
15 IEEE DCF MAC MAC w/ exponentional backoff How do you detect a collision without collision detection? You don t! You intuit them! Any failed transmission (i.e. you didn t get an ACK) is interpreted as a collision. Chapter 6, slide 34
16 More challenges: Hidden terminal problem C A B C A B A s signal strength C s signal strength Hidden terminal problem B, A hear each other B, C hear each other A, C can not hear each other, and hence, may interfere at B space Signal attenuation: B, A hear each other B, C hear each other A, C can not hear each Problem: If A is transmitting to B, C won t be able to sense that medium is busy Chapter 6, slide 35
17 RTS/CTS handshaking mechanism idea: allow sender to reserve channel rather than random access of data frames Solves the hidden terminal problem Avoids collisions of long data frames Sender: transmits small request-to-send (RTS) packets Receiving neighbors all hear this RTS defer receipt RTSs may still collide with each other (but they re short) Receiver: transmits small clear-to-send (CTS) packets in response to RTS Sending neighbors all hear CTS defer transmission Chapter 6, slide 36
18 Collision Avoidance: RTS-CTS exchange A B C reservation collision DATA (A) defer time Chapter 6, slide 37
19 Final words Carrier sense mechanisms: there are two types Physical carrier sensing actual sensing of medium to determine whether it is busy or not Virtual carrier sensing provided by MAC via RTS/CTS frames. Predicts future traffic based on information/duration indicated in RTS/CTS frames Chapter 6, slide 38
20 Outline Wireless wireless characteristics multiple access schemes TDMA/FDMA CDMA Wi-Fi wireless LANs CSMA/CA IEEE Mobility principles: addressing routing to mobile users mobile IP Chapter 6, slide 39
21 What is mobility? spectrum of mobility, from the network perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from network using DHCP. mobile user, passing through multiple access point while maintaining ongoing connections (like cell phone) Chapter 6, slide 40
22 Mobility: Vocabulary home network: permanent home of mobile (e.g., /24) home agent: entity that will perform mobility functions on behalf of mobile, when mobile is remote Permanent address: address in home network, can always be used to reach mobile e.g., wide area network correspondent Chapter 6, slide 41
23 Mobility: more vocabulary Permanent address: remains constant (e.g., ) visited network: network in which mobile currently resides (e.g., /24) Care-of-address: address in visited network. (e.g., 79, ) wide area network correspondent: wants to communicate with mobile foreign agent: entity in visited network that performs mobility functions on behalf of mobile. Chapter 6, slide 42
24 How do you contact a mobile friend: Consider a friend who frequently changes addresses, how do you find her? I wonder where Alice moved to? expect her to update the new phone book: So, search all phone books for new address? expect her to let you know where she is? So, use her new address expect her to let her parents know So, call her parents? Chapter 6, slide 43
25 Mobility: approaches Let routing handle it: routers advertise permanent address of mobile-nodes-in-residence via usual routing table exchange. routing tables indicate where each mobile located no changes to end-systems Let end-systems handle it: Let mobile inform his home agent E.g. let Alice inform her parents Alice s friend must contact her parent before Chapter 6, slide 44
26 Mobility: approaches Let routing handle it: routers advertise permanent address of mobile-nodes-in-residence not via usual routing table exchange. scalable to millions of mobiles routing tables indicate where each mobile located no changes to end-systems Let end-systems handle it: Let mobile inform his home agent E.g. let Alice inform her parents Alice s friend must contact her parent before Chapter 6, slide 45
27 Mobility: registration home network visited network wide area network foreign agent contacts home agent home: this mobile is resident in my network 2 1 mobile contacts foreign agent on entering visited network End result: Foreign agent knows about mobile Home agent knows location of mobile Chapter 6, slide 46
28 Mobility via Indirect Routing indirect routing: communication from correspondent to mobile goes via home agent, then forwarded to remote home network correspondent addresses packets using home address of mobile home agent intercepts packets, forwards to foreign agent 1 wide area network 2 foreign agent receives packets, forwards to mobile 4 3 visited network mobile replies directly to correspondent Chapter 6, slide 47
29 Mobility via Direct Routing direct routing: correspondent gets foreign address of mobile, then sends directly to mobile home network correspondent forwards to foreign agent foreign agent receives packets, forwards to mobile 4 visited network correspondent requests, receives foreign address of mobile 2 1 wide area network 3 5 mobile replies directly to correspondent Chapter 6, slide 48
30 Outline Wireless wireless characteristics multiple access schemes TDMA/FDMA CDMA Wi-Fi wireless LANs CSMA/CA IEEE Mobility principles: addressing routing to mobile users mobile IP Chapter 6, slide 49
31 Mobile IP RFC 3344 has many features we ve seen: home agents, foreign agents, foreign-agent registration, care-of-addresses, encapsulation (packet-within-a-packet) Uses indirect routing of datagrams Chapter 6, slide 50
32 Mobile IP: indirect routing foreign-agent-to-mobile packet packet sent by home agent to foreign agent: a packet within a packet dest: dest: dest: Permanent address: dest: packet sent by correspondent Care-of address: Chapter 6, slide 51
33 Wireless, mobility: last words Challenges/issues packet loss/delay due to bit-errors (discarded packets, delays for link-layer retransmissions), and handoff congestion: TCP interprets loss as congestion, will decrease congestion window unnecessarily bandwidth: limited bandwidth of wireless links Chapter 6, slide 52
Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7
ECE/CS 372 introduction to computer networks Announcements: Assignment 4 due now Chapter 7 Acknowledgement: slides drawn heavily from Kurose & Ross and Prof. Bechir Hamdaoui Chapter 7, slide 1 Wireless
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationCPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts
1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number
More informationCSC 4900 Computer Networks: Mobility
CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping
More informationWireless Network and Mobility
Wireless Network and Mobility Dept. of Computer Science, University of Rochester 2008-11-17 CSC 257/457 - Fall 2008 1 Wireless Networks and Mobility Wireless networking in the data link layer Short range:
More informationCSCI-1680 Wireless Chen Avin
CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks
More informationComputer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the
Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not
More informationAnnouncements: ECE/CS 372 introduction to computer networks. Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon
ECE/CS 372 introduction to computer networks Lecture 14 Announcements: Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon Credit for lecture slides to Professor Bechir Hamdaoui
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationLast time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling
Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet
More informationChapter 5 Wireless and Mobile Networks
Chapter 5 Wireless and Mobile Networks Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Wireless and Mobile Networks Chapter 5: Wireless
More informationModule 6: Wireless Mobile Networks
Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationChapter 6 Wireless and Mobile Networks (Wireless and Mobility)
CSF645 Mobile Computing 行動計算 Chapter 6 Wireless and Mobile Networks (Wireless and Mobility) Computer Networking: A Top Down Approach 6 th edition, Jim Kurose, Keith Ross 吳俊興國立高雄大學資訊工程學系 outline 6.1 Introduction
More informationNo lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after.
Administrivia No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after. 1 CSMA/CA: Recap Sensing in wireless medium is limited
More informationCSC 8560 Computer Networks: Wireless and Mobility
CSC 8560 Computer Networks: Wireless and Mobility Professor Henry Carter Fall 2017 Chapter 7: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers!
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationCS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.
CS118 Discussion 1A, Week 9 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Wireless: 802.11 Mobile IP Cellular Networks: LTE Sample final 2 Wireless and Mobile Network Wireless access: WIFI
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationChapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees
Chapter 4 roadmap 4. Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What s Inside a Router 4.4 The Internet (IP) Protocol 4.5 Routing Algorithms 4.6 Routing in the Internet 4.7
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationMedium Access Control
Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationWireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationCommunication Networks: Wireless and Mobile Communication Networks. Prof. Amir Herzberg BIU, Dept. of CS
89-850 Communication Networks: Wireless and Mobile Communication Networks Prof. Amir Herzberg BIU, Dept. of CS From ch.6 of Kurose and Ross, 3 rd edition; and [KMK], ch. 8. All material copyright 1996-2004
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach. Andrei Gurtov
Chapter 7 Wireless and Mobile Networks Andrei Gurtov All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationIntroduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II
Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless
More informationChapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du
Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each
More informationCC451 Computer Networks
CC451 Computer Networks Lecture 9 Link Layer 5: DataLink Layer 5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students,
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationMAC. Fall Data Communications II 1
802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling
More informationChapter 3: Wireless and Mobile Networks
Computer Network Architectures and Multimedia Guy Leduc Chapter 3 Wireless and Mobile Networks Chapter 7 of Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationMobility: vocabulary
What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationChapter 7. Wireless and Mobile Networks 7-1
Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationExtending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.
Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationLecture 15 Wireless and Mobility
Lecture 15 Wireless and Mobility From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright 1996-2016 J.F Kurose and K.W. Ross,
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: The notes used in this course are substantially based on powerpoint slides developed and copyrighted by J.F. Kurose and K.W.
More informationStudent ID: CS457: Computer Networking Date: 5/8/2007 Name:
CS457: Computer Networking Date: 5/8/2007 Name: Instructions: 1. Be sure that you have 10 questions 2. Write your Student ID (email) at the top of every page 3. Be sure to complete the honor statement
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationAlready finished all layers in the stack, why a separate chapter for wireless and mobile networks?
Wireless and Mobile Networks Yanmin Zhu Department of Computer Science and Engineering Mobile lobal ISP Home Regional ISP Institutional Already finished all layers in the stack, why a separate chapter
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationLogical Link Control (LLC) Medium Access Control (MAC)
Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationWireless and Mobile Networks
Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals # wireline Internet-connected
More informationMidterm Review EECS 122. University of California Berkeley
Midterm Review EECS 122 University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi 2 Review: Network WAN MAN 3 Review: Network WAN MAN
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationData Link Layer: Multi Access Protocols
Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationLecture 19. Principles behind data link layer services Framing Multiple access protocols
Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer
More informationCS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More information