Carrier Wave! Signals! Modulation! Internet Protocol Stack!

Size: px
Start display at page:

Download "Carrier Wave! Signals! Modulation! Internet Protocol Stack!"

Transcription

1 Internet Protocol Stack! Carrier Wave! application: supporting network applications!! HTTP, SMTP, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams from source to destination!! IP, routing protocols! link: data transfer between neighboring network elements!! Ethernet, WiFi! physical: bits on the wire! application transport network link physical Observation: a continuous, oscillating signal propagates further (with less signal loss) than other signals! Hence to send data long distance, we use a continuous sine wave as a carrier wave! Data is carried by modifying the carrier wave, a process called modulation! Two types of modulation:! 1.! Amplitude Modulation (AM): not as robust! 2.! Frequency Modulation (FM): more robust! Modem: modulator-demodulator! Modulation! Signals! Other types of modulation:! 1.!Binary Frequency-Shift Keying (BFSK): uses 2 fixed-amplitude carrier signals, each representing " 1 and 0! 2.!Binary Phase-Shift Keying (BPSK): both frequency and amplitude of the carrier signal are fixed, 1 and 0 are different phases of the signal! 3.!Differential Phase-Shift Keying (DPSK): phase shift occurs at each bit transition, the phase difference is relative to the last bit! Halsall! Bit vs. Baud!! bit transmitted as electrical or optical signal!! bit rate: number of bits per second!! baud rate: signal/voltage level changes per second!! each level can represent multiple bits!! for binary signalling, bit rate == baud rate!! for M-ary signalling, bit rate! baud rate!! example: 4-ary signalling! Example: RS-232!! negative voltage (-15V) represents a 1!! positive voltage (+15V) represents a 0!! bit rate == baud rate!! 7 bits/character!! to allow asynchronous communication: " 1 start bit, 1 stop bit! voltage sec -3 7 baud/sec = 14 bps time

2 Modulation! Other types of modulation:! 1.!Quadrature Phase-Shift Keying (QPSK): each phase of the signal represents 2 bits, giving 4 values! 2.!8PSK: each phase represents 3 bits, giving 8 values" Reducing phase differences makes the signal more prone to noise and interference! 3.!Quadrature Amplitude Modulation (QAM): introduces amplitude in addition to phase variations: 16QAM carries 4 bits per symbol! 4.!Orthogonal FDM (OFDM): uses orthogonal sub-frequencies, instead of mathematical codes, to carry signal; uses Inverse FFT to create composite waveform, decoded with FFT! Halsall! Dahlman et al.! Wireless Link Characteristics! Differences from wired link.!! decreased signal strength: radio signal attenuates as it propagates through matter (path loss)!! interference from other sources: standardized wireless network frequencies (e.g., 2.4 GHz) shared by other devices (e.g., phone); devices (motors) interfere as well!! multipath propagation: radio signal reflects off objects, ground, arriving at destination at slightly different times!. make communication across (even a point to point) wireless link much more difficult! Wireless Link Characteristics! SNR: signal-to-noise ratio! BER: bit error rate!! larger SNR easier to extract signal from noise (a good thing )! SNR versus BER tradeoffs!! given physical layer: increased power! increased SNR! decreased BER!! given SNR: choose physical layer that meets BER requirement, giving highest throughput!! SNR may change with mobility: dynamically adapt physical layer (modulation technique, rate)!! all the latest standards have rate adaptation, including , , and LTE! Fundamental trade-off: power vs. range vs. rate! BER SNR(dB) QAM256 (8 Mbps) QAM16 (4 Mbps) BPSK (1 Mbps) Multi-antenna (MIMO) Techniques! With bandwidth reaching Shannon s limit, future gain in bandwidth will come from smarter antenna use:! Beamforming: generating interfering patterns from multiple antennae such that the intended signal is strengthened, in the direction intended (a.k.a., smart antenna and adaptive antenna system (AAS))! Spatial multiplexing: transmitting multiple data streams simultaneously on the same frequency using multiple antennae; streams received over multiple antennae and separated using various detection algorithms" (usually MIMO is used to refer to spatial multiplexing in particular)! Chen & Guizani!

3 Data Link Layer! The Data Link layer can be further subdivided into:! 1.! Logical Link Control (LLC): error and flow control! 2.! Media Access Control (MAC): framing and media access! different link protocols may provide different services, e.g., Ethernet doesn t provide reliable delivery (error recovery)! application transport network LLC MAC physical Multiple Access Problem! Broadcast channel of rate R bps, shared medium!! if two users send at the same time, collision results in no packet being received (interference)!! if no users send, channel goes idle!! thus, want to have only one user send at a time! Media Access Control:!! determines who gets to send next!! what to do if more than one hosts " send at the same time and there s collision! Duplex mode:!! half duplex: only one end can send at a time!! full duplex: both ends can send simultaneously! MAC Protocols: a Taxonomy! Three broad classes:! 1.! Channel Partitioning!! divide channel into smaller pieces (time slots, frequency, code)!! allocate piece to node for exclusive use!! TDMA, FDMA, CDMA! 2.! Random Access!! channel not divided, allow collisions!! recover from collisions!! CSMA/CD, CSMA/CA! 3.! Polling, reservation, taking turns!! Nodes take turns, but nodes with more to send can take longer turns!! Token ring, WiMAX! WiMAX: Downlink, Uplink Scheduling! Transmission frame!! down-link subframe: base station to node!! uplink subframe: node to base station! pream. DL- MAP UL- MAP DL burst 1 DL burst 2 downlink subframe DL burst n Initial maint. request conn. SS #1 SS #2 SS #k uplink subframe base station tells mobiles who will get to receive (DL map)! and who will get to send (UL map), and when! WiMAX standard provide mechanism for scheduling, but not the scheduling algorithm itself!

4 TDMA: Time Division Multiple Access!! channel divided into N time slots, one per user!! access to channel in "rounds"!! each station gets fixed length slot (length = packet transmission time) in each round! frequency! Example:! 4 users! time!! inefficient with low duty cycle users and at light load: unused slots go idle!! example: 6-station LAN, 1,3,4 have packets, slots 2,5,6 idle! FDMA: Frequency DMA!! channel spectrum divided into frequency bands!! each station assigned fixed frequency band! frequency! time!! unused transmission time in frequency bands go idle!! example: 6-station LAN, 1,3,4 have packets, frequency bands 2,5,6 idle! frequency bands time Example:! 4 users! FDMA, TDMA, CDMA! code! CDMA: Code DMA! Unique code (c m ) assigned to each user (m); i.e., code set partitioning! All users share same frequency, but each user has own chipping sequence (i.e., code) to encode data! Encoded signal for bit i for user m (Z i,m ) = (original data bit i, d i ) * (chipping sequence, c m )! Decoding: dot-product of encoded signal and chipping sequence divided by c m =M Allows multiple users to coexist and transmit simultaneously with minimal interference (if codes are orthogonal or have low cross correlation)!

5 CDMA Encode/Decode! CDMA with Multiple Users! sender! data! bits! code! d 1 = d 0 = slot 1! slot 0! Z i,m = d i c m channel output Z i,m 1-1 slot 1! channel! output! slot 0! channel! output! receiver! received! input! code! slot 1! slot 0! D i = M! Z i,m c m m=1 c m d 1 = -1 slot 1! channel! output! d 0 = 1 slot 0! channel! output! CDMA: Two-Sender Case! Dot Product Review!! b a! The dot product of two vectors a and b is a scalar value a b cos(!)! Another way to compute a b is as:"! b a b =! a x a y # x # 2 % & " $ b " % y $ & = ' a b i i = a x b x + a y b y i=0! If a and b are orthogonal ( a! b ),! = 90 0," a b = 0

6 CDMA Decoding! Receiver extraction works because each bit of code (c m,i ) is equally likely to be -1 or +1! So if the wrong code (c m,i ) is used to decode, "c m c m is likely to be 0! If the right code is used, the sign of "c m c m determines whether data is 1 or -1! Instead of low-cross correlation random code per sender, can use orthogonal codes which guarantees "c m c m = 0 if the wrong code is used to decode! Wireless Link Characteristics! Differences from wired link.!! decreased signal strength: radio signal attenuates as it propagates through matter (path loss)!! interference from other sources: standardized wireless network frequencies (e.g., 2.4 GHz) shared by other devices (e.g., phone); devices (motors) interfere as well!! multipath propagation: radio signal reflects off objects, ground, arriving at destination at slightly different times!. make communication across (even a point to point) wireless link much more difficult! CDMA: Issues! LAN architecture!! Code choice: Barker (802.11), Walsh (cdmaone), Orthogonal Variable Spreading Factor (WCDMA)!! Power control: powerful signal interferes with others!! open-loop: observe received signal, works for TDD, not so well for FDD!! closed-loop: requires fast " feedback time! AP! Internet! hub, switch! or router! Wireless host communicates with base station/access point (AP)! Basic Service Set (BSS) (aka cell ) in infrastructure mode contains:!! wireless hosts!! access point (AP): base station!! RAKE receiver:!! takes advantage of multipathing: multiple copies of streams arrive at the receiver as signal is bounced off the environment; with RAKE receiver, late arriving copies used to help strengthen the signal!! enables soft handoff: a mobile receives copies from multiple base stations during handoff! Kwok & Lau! BSS 1! AP! BSS 2! Ad hoc mode contains hosts only!

7 802.11: Channels, Association! b: 2.4GHz-2.485GHz spectrum divided into 11 channels at different frequencies!! AP admin chooses frequency for AP!! interference possible: channel can be same as that chosen by neighboring AP!! Host: must associate with an AP!! scans channels, listening for beacon frames containing AP s name (SSID) and MAC address!! selects AP to associate with!! may perform authentication!! will typically run DHCP to get IP address in AP s subnet! : Passive/Active Scanning! AP 1! BBS 1! 1 H1! 1 2 BBS 2! AP 2! Passive Scanning:! (1)!Beacon frames sent from APs! (2)!Association Request frame sent from H1 to selected AP! (3)!Association Response frame sent from selected AP to H1! 3 AP 1! BBS 1! 2 1 H1! BBS 2! AP 2! Active Scanning:! (1)!Probe Request frame broadcast from H1! (2)!Probe Response frames sent from APs! (3)!Association Request frame sent from H1 to selected AP! (4)!Association Response frame sent from selected AP to H1! Wireless Network Characteristics! Multiple wireless senders and receivers create additional problems (beyond multiple access):! A! C! B! Hidden terminal problem!! B, A hear each other!! B, C hear each other!! A, C can not hear each other!! A, C unaware of their interference at B! A! B! C! A s signal! strength! space! C s signal! strength! Signal fading:!! B, A hear each other!! B, C hear each other!! A, C can not hear each other interfering at B! IEEE : Multiple Access! Collision: two or more nodes transmitting at same time! : CSMA - sense before transmitting!! don t collide with ongoing transmission by another node! : no collision detection!!! difficult to receive (sense collisions) when transmitting due to weak received signals (fading)!! can t sense all collisions in any case: hidden terminal, fading!! goal: avoid collisions: CSMA/C(ollision)A(voidance)! A! C! B! A! B C! A s signal! strength! space! C s signal! strength!

8 IEEE MAC Protocol: CSMA/CA! sender:! 1.! if sense channel idle for DIFS time, transmit entire frame (no CD)! 2.! if sense channel busy start DIFS+random backoff time (why the random part?)!! timer counts down while channel idle!! transmit when timer expires! 3.! if no ACK, increase random backoff interval, repeat 2! receiver:!! if frame received OK, return ACK after " SIFS time (why we need ACK?)! DIFS! sender! data! ACK! receiver! SIFS! Use of Short Inter-Frame Spacing and Distributed IFS act as a way to prioritize transmission (ACKs get to go first)! Collision Avoidance! Allow sender to reserve channel rather than relying on random access of data frames: avoid collisions of long data frames! Sender first transmits small request-to-send (RTS) packets to AP using CSMA!! RTSs may still collide with each other (but they re short)! AP broadcasts clear-to-send (CTS) in response to RTS! RTS heard by all nodes!! sender transmits data frame!! other nodes defer transmissions! Avoid data frame collisions completely by using small reservation packets!! But usually not done on deployed systems... (why?)! RTS-CTS Exchange! Wireless Network Characteristics! time! A! B! AP! RTS(A)! RTS(A)! CTS(A)! DATA (A)! ACK(A)! reservation collision CTS(A)! ACK(A)! RTS(B)! defer! D! A! C! B! Exposed terminal problem:!! B sends to A!! C can send to D without interfering with B s transmission to A!! Solution: if C hears B s RTS but not A s CTS, C can send" (A can be an AP)!

9 Frame: Addressing! Frame: Addressing! frame address address address seq address duration payload CRC control control 4 Address 1: MAC address! of wireless host or AP! to receive this frame! Address 2: MAC address! of wireless host or AP! transmitting this frame! Address 3: MAC address! of router interface to which AP is attached! Address 3: used only in ad hoc mode! Internet! router! H1! R1! AP! R1 MAC addr AP MAC addr! dest. address! source address! frame! AP MAC addr H1 MAC addr R1 MAC addr! address 1! address 2! address 3! frame! Frame: More! frame control Protocol version duration address 1 Type duration of reserved! transmission time (RTS/CTS)! Subtype address 2 To AP address 3 From AP seq control More frag address 4 frame seq #! (for reliable ARQ)! 1 1 Power Retry mgt payload More data CRC WEP Rsvd : Power Management! Power Management!! node-to-ap: I am going to sleep until next beacon frame!! AP knows not to transmit frames to this node!! node wakes up before next beacon frame!! beacon frame: contains list of mobiles with AP-tomobile frames waiting to be sent!! node will stay awake if it has frame incoming; otherwise sleep again until next beacon frame! frame type! (RTS, CTS, ACK, data)!

10 Wired Equivalent Privacy (WEP):! Authentication:!! host requests authentication from access point!! access point sends 128 bit nonce!! host encrypts nonce using shared symmetric key!! access point decrypts nonce, authenticates host! No key distribution mechanism! Authentication: knowing the shared key is enough! WEP Data Encryption! Host/AP share 40 bit symmetric key (semi-permanent)! Host appends 24-bit initialization vector (IV) to create 64-bit key! 64 bit key used to generate stream of keys, k i IV! k i IV used to encrypt i-th byte, d i, in frame:! c i = d i XOR k i IV! IV and encrypted bytes, c i sent in frame, IV sent in the clear! Sender-side WEP encryption! Breaking WEP Encryption! Security vulnerability:!! 24-bit IV, one IV per frame! IV s eventually reused!! IV transmitted in plaintext! IV reuse detected!! Since shared key is not changed, this gives only 2 24 unique keys!! Key reuse is > 99% probable after only 12,000 frames!! With 1K frame size, at 11 Mbps transmission, this means only a few seconds of transmission! Attack:!! Trudy causes Alice to encrypt known plaintext d 1 d 2 d 3 d 4!! Trudy sees: c i = d i XOR k i IV!! Trudy knows c i and d i, so can compute k i IV!! Trudy knows encrypting key sequence k 1 IV k 2 IV k 3 IV!! next time IV is used, Trudy can decrypt!! i: Improved Security! A 2004 amendment to the original standard, incorporated into the 2007 updated standard!! replaces WEP!! subsumes WPA (Wi-Fi Protected Access)!! a.k.a. WPA2 or RSN (Robust Security Network)! Provides key distribution! Uses authentication server separate from access point!

11 802.11i Encryption Key Distribution! Cellular Networks: the Last Mile! MH: mobile host 1 Discovery of security capabilities AP: access point wired network 2 MH and AS mutually authenticate, together generate Master Key (MK). AP servers as pass through 3 MH derives Pairwise Master Key (PMK) 4 MH, AP use PMK to derive Temporal Key (TK) used for message encryption, integrity 3 AS derives same PMK, sends to AP AS: Authentication server Three techniques for sharing mobile-to-base station radio spectrum:!! Combined FDMA/TDMA: divide spectrum in frequency channels, divide each channel into time slots!! CDMA: code division frequency bands multiple access!! Taking turn by scheduling! time slots What is Mobility?! : Mobility Within Same Subnet! Spectrum of mobility, from the network perspective:! no mobility! mobile wireless user, using same AP! mobile user, (dis)connecting from network using DHCP! high mobility! mobile user, passing through multiple access point while maintaining ongoing connections (like cell phone)! H1 remains in same IP subnet: IP address can remain same! switch: which AP is associated with H1?!! self-learning (Ch. 5): switch will see frame from H1 and remember which switch port can be used to reach H1! BBS 1! AP 1! router! hub or! switch! AP 2! H1! BBS 2!

12 How do You Contact a Mobile Friend! Mobility: Approaches! Consider friend frequently changing addresses, how do you find her?! search all phone books?! call her parents?! expect her to let you! know where he/she is?! I wonder where Alice moved to? Let routing handle it: routers advertise permanent not! address of mobile-nodes-in-residence via usual routing scalable! table exchange.! to millions of!! routing tables indicate where each mobile located! mobiles!! no changes to end-systems! Let end-systems handle it:!! indirect routing: communication from correspondent to mobile goes through home agent, then forwarded to remote!! direct routing: correspondent gets foreign address of mobile, sends directly to mobile! Boeing Connexion Mobility Service! Mobility: Vocabulary! home network: permanent home of mobile! (e.g., /24)! home agent: entity that will perform mobility functions on behalf of mobile, when mobile is remote! Permanent address: address in home network, can always be used to reach mobile! e.g., ! wide area

13 Mobility: More Vocabulary! correspondent: wants to communicate with mobile! Permanent address: remains constant (e.g., )! Care-of-address: address in visited network.! (e.g., 79, )! wide area visited network: network in which mobile currently resides (e.g., /24)! foreign agent: entity in visited network that performs mobility functions on behalf of mobile.! Mobility: Registration! home 2! wide area foreign agent contacts home agent home: this mobile is resident in my network! End result:! Foreign agent knows about mobile! Home agent knows location of mobile! visited 1! mobile contacts foreign agent on entering visited Mobility via Indirect Routing! home! correspondent addresses packets using home address of mobile! home agent intercepts packets, forwards to foreign agent! 1! wide area 2! foreign agent receives packets, forwards to mobile! 4! 3! visited! mobile replies directly to Indirect Routing! Mobile uses two addresses:!! permanent address: used by correspondent (hence mobile location is transparent to correspondent)!! care-of-address: used by home agent to forward datagrams to mobile! Foreign agent functions may be done by mobile itself! Moving between networks: suppose mobile user moves to another! registers with new foreign agent!! new foreign agent registers with home agent!! home agent update care-of-address for mobile!! packets continue to be forwarded to mobile (but with new care-of-address)! mobility, changing foreign networks is transparent: on going connections can be maintained!! Triangle routing:! correspondent-home-network-mobile!! inefficient when correspondent, mobile are" in same

14 Mobility via Direct Routing! home! correspondent requests, receives foreign address of mobile! correspondent forwards to foreign agent! 2! 1! wide area foreign agent receives packets, forwards to mobile! 3! 5! 4! visited! mobile replies directly to Mobility via Direct Routing" Comments! overcome triangle routing problem! non-transparent to correspondent: correspondent must get care-of-address from home agent!! what if mobile changes visited network?! Accommodating Mobility " with Direct Routing! Anchor foreign agent: FA in first visited Data always routed first to anchor FA! When mobile moves: new FA arranges to have data forwarded from old FA (chaining)! correspondent wide area 1! correspondent agent anchor foreign agent 5! 4! 3! new foreign agent foreign net visited at session start 2! new foreign network Mobile IP [RFC3220]! Has many features we ve seen:!! home agents, foreign agents, foreign-agent registration, care-of-addresses, encapsulation (packet-within-a-packet)! three components to standard:!! indirect routing of datagrams!! agent discovery!! registration with home agent!

15 Components of! Cellular Network Architecture! MSC! wired public telephone! MSC! MSC! MSC! MSC! different cellular networks,! operated by different providers! GSM: Handoff within Common MSC! old BS! VLR! Mobile! Switching! Center! old! routing! new! routing! new BS! Handoff goal: route call via new base station (without interruption)! Reasons for handoff:!! stronger signal to/from new BS (continuing connectivity, less battery drain)!! load balance: free up channel in current BS!! GSM doesn t mandate why to perform handoff (policy), only how (mechanism)! Handoff initiated by old BS! old BS GSM: Handoff with Common MSC! VLR Mobile Switching Center new BS 1.! old BS informs MSC of impending handoff, provides list of 1 + new BSs 2.! MSC sets up path (allocates resources) to new BS 3.! new BS allocates radio channel for use by mobile 4.! new BS signals MSC, old BS: ready 5.! old BS tells mobile: perform handoff to new BS 6.! mobile, new BS signal to activate new channel 7.! mobile signals via new BS to MSC: handoff complete. MSC reroutes call 8.! MSC-old-BS resources released! Handling Mobility in" Cellular Networks! Home network: network of cellular provider you subscribe to (e.g., Sprint PCS, Verizon)!! home location register (HLR): database in home network containing permanent cell phone #, profile information (services, preferences, billing), information about current location (could be in another network)! Visited network: network in which mobile currently resides!! visitor location register (VLR): database with entry for each user currently in! could be home

16 GSM: Indirect Routing to Mobile! GSM: Handoff Between MSCs! home MSC consults HLR,! gets roaming number of! mobile in visited mobile! user! HLR! 2! 4! home! home! Mobile! Switching! Center! VLR! Mobile! Switching! Center! visited! 3! 1! call routed! to home Public switched! telephone! network! home MSC sets up 2 nd leg of call! to MSC in visited MSC in visited network completes! call through base station to mobile! home Home MSC! anchor MSC! MSC! PSTN! MSC! MSC! Anchor MSC: first MSC visited during call!! call remains routed through anchor MSC! New MSCs add on to end of MSC chain as mobile moves to new MSC! IS-41 allows optional path minimization step to shorten multi-msc chain! Session Initiation Protocol (SIP)! Comes from IETF! SIP long-term vision!! All telephone calls and video conference calls take place over the Internet!! People are identified by names or addresses, rather than by phone numbers!! You can reach the callee, no matter where the callee roams, no matter what IP device the callee is currently using! Included as part of 3GPP s IP Multimedia Subsystem (IMS)! SIP Services! Setting up a call!! provides mechanisms for caller to let callee know she wants to establish a call!! provides mechanisms so that caller and callee can agree on media type and encoding!! provides mechanisms to end call! Determine current IP address of callee!! maps mnemonic identifier to current IP address! Call management!! add new media streams during call!! change encoding during call!! invite others!! transfer and hold calls!

17 Setting up a Call to an IP Address!! Alice s SIP invite message indicates her port number & IP address, and encoding that Alice prefers to receive (PCM ulaw)"! Bob s 200 OK message indicates his port number, IP address & preferred encoding (GSM)"! SIP messages can be sent over TCP or UDP; here sent over RTP/UDP" Setting up a Call (more)! Codec negotiation:!! suppose Bob doesn t have PCM ulaw encoder!! Bob will instead reply with 606 Not Acceptable Reply and list encoders he can use!! Alice can then send a new INVITE message, advertising an appropriate encoder! Rejecting the call!! Bob can reject with replies busy, gone, payment required, forbidden! Media can be sent over RTP or some other protocol!! Default SIP port number is 5060! Name Translation and User Location! Caller wants to call callee, but only has callee s name or address! Need to get IP address of callee s current host:!! user moves around!! DHCP protocol!! user has different IP devices (PC, PDA, car device)! Result can be based on:!! time of day (work, home)!! caller (don t want boss to call you at home)!! status of callee (calls sent to voic when callee is already talking to someone)! Service provided by SIP servers:!! SIP registrar server!! SIP proxy server! Example of SIP Message! INVITE sip:bob@domain.com SIP/2.0 Via: SIP/2.0/UDP From: sip:alice@hereway.com To: sip:bob@domain.com Call-ID: a2e3a@pigeon.hereway.com Content-Type: application/sdp Content-Length: 885 c=in IP m=audio RTP/AVP 0 Notes:! HTTP message syntax! sdp = session description protocol! Call-ID is unique for every call!! Here we don t know Bob s IP address, intermediate SIP servers will be necessary!! Alice sends and " receives SIP messages " using the SIP default " port number 5060!! Alice specifies in Via:" header that SIP client " sends and receives " SIP messages over UDP!

18 SIP Registrar! When Bob starts SIP client, client sends SIP REGISTER message to Bob s registrar server (similar function needed by Instant Messaging)! Register Message:! REGISTER sip:domain.com SIP/2.0 Via: SIP/2.0/UDP From: sip:bob@domain.com To: sip:bob@domain.com Expires: 3600 SIP Proxy! Alice sends invite message to her proxy server!! contains address sip:bob@domain.com! Proxy responsible for routing SIP messages to callee!! possibly through multiple proxies! Callee sends response back through the same set of proxies! Proxy returns SIP response message to Alice!! contains Bob s IP address! Note: proxy is analogous to local DNS server! Example! Caller jim@umass.edu " with places a! call to keith@upenn.edu " (1) Jim sends INVITE" message to umass SIP" proxy (2) Proxy forwards" request to upenn " registrar server" (3) upenn server returns" redirect response," indicating that it should " try keith@eurecom.fr! (4) umass proxy sends INVITE to eurecom registrar (5) eurecom registrar forwards INVITE to , which is running keith s SIP client (6-8) SIP response sent back (9) media sent directly between clients! Note: also a SIP ack message, which is not shown!

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

CSCI-1680 Wireless Chen Avin

CSCI-1680 Wireless Chen Avin CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks

More information

CS 332 Computer Networks Wireless Networks

CS 332 Computer Networks Wireless Networks CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose

More information

No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after.

No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Administrivia No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after. 1 CSMA/CA: Recap Sensing in wireless medium is limited

More information

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts 1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

CSC 8560 Computer Networks: Wireless and Mobility

CSC 8560 Computer Networks: Wireless and Mobility CSC 8560 Computer Networks: Wireless and Mobility Professor Henry Carter Fall 2017 Chapter 7: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers!

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Module 6: Wireless Mobile Networks

Module 6: Wireless Mobile Networks Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Mobility: vocabulary

Mobility: vocabulary What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,

More information

CSC 4900 Computer Networks: Mobility

CSC 4900 Computer Networks: Mobility CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,

More information

Chapter 6 Wireless and Mobile Networks (Wireless and Mobility)

Chapter 6 Wireless and Mobile Networks (Wireless and Mobility) CSF645 Mobile Computing 行動計算 Chapter 6 Wireless and Mobile Networks (Wireless and Mobility) Computer Networking: A Top Down Approach 6 th edition, Jim Kurose, Keith Ross 吳俊興國立高雄大學資訊工程學系 outline 6.1 Introduction

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Chapter 5 Wireless and Mobile Networks

Chapter 5 Wireless and Mobile Networks Chapter 5 Wireless and Mobile Networks Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Wireless and Mobile Networks Chapter 5: Wireless

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,

More information

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless

More information

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Reading Guide: Chapter 6: 6.1 6.4 1 Ch. 6: Wireless and Mobile Networks Background: v # wireless (mobile) phone subscribers now exceeds # wired

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,

More information

Multimedia networking: outline

Multimedia networking: outline Multimedia networking: outline 9.1 multimedia networking applications 9.2 streaming stored video 9.3 voice-over-ip 9.4 protocols for real-time conversational applications: SIP Skip RTP, RTCP 9.5 network

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected to wired relay - responsible for sending

More information

Already finished all layers in the stack, why a separate chapter for wireless and mobile networks?

Already finished all layers in the stack, why a separate chapter for wireless and mobile networks? Wireless and Mobile Networks Yanmin Zhu Department of Computer Science and Engineering Mobile lobal ISP Home Regional ISP Institutional Already finished all layers in the stack, why a separate chapter

More information

M06:Wireless and Mobile Networks. Corinna Schmitt

M06:Wireless and Mobile Networks. Corinna Schmitt M06:Wireless and Mobile Networks Corinna Schmitt corinna.schmitt@unibas.ch Acknowledgement 2016 M06 2 Background q # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)!

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed. Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in

More information

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network. Chapter 6 Wireless and obile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Chapter 6: Wireless and obile Networks

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: The notes used in this course are substantially based on powerpoint slides developed and copyrighted by J.F. Kurose and K.W.

More information

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network Elements of a wireless Elements of a wireless wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected

More information

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach. Andrei Gurtov

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach. Andrei Gurtov Chapter 7 Wireless and Mobile Networks Andrei Gurtov All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals # wireline Internet-connected

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Wireless Security Background

Wireless Security Background Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless

More information

Chapter 7. Wireless and Mobile Networks 7-1

Chapter 7. Wireless and Mobile Networks 7-1 Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Chapter 3: Wireless and Mobile Networks

Chapter 3: Wireless and Mobile Networks Computer Network Architectures and Multimedia Guy Leduc Chapter 3 Wireless and Mobile Networks Chapter 7 of Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

Lecture 15 Wireless and Mobility

Lecture 15 Wireless and Mobility Lecture 15 Wireless and Mobility From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright 1996-2016 J.F Kurose and K.W. Ross,

More information

3/20/2012. Data Communications & Networks. Session 5 Main Theme. 2 Wireless and Mobile Networks. Dr. Jean-Claude Franchitti

3/20/2012. Data Communications & Networks. Session 5 Main Theme. 2 Wireless and Mobile Networks. Dr. Jean-Claude Franchitti Data Communications & Networks Session 5 Main Theme Wireless and Mobile Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted

More information

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui

More information

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1 Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer

More information

Mobile devices for wireless

Mobile devices for wireless Mobile devices for wireless Wireless sensors Limited proc. power Small battery Laptop functionally eq. to desktop standard applications TDTS04/09 Föreläsning 0/6: WLAN och TCP i trådlösa nät RFID tag A

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers

More information

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. CS118 Discussion 1A, Week 9 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Wireless: 802.11 Mobile IP Cellular Networks: LTE Sample final 2 Wireless and Mobile Network Wireless access: WIFI

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind)

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind) Wireless Internet Routing Review of Wireless Networking (with Routing in Mind) 1 Review of Wireless Networking Architecture of wireless networks Wireless PHY Wireless MAC o 802.11 PHY: physical layer /

More information

Real-Time Control Protocol (RTCP)

Real-Time Control Protocol (RTCP) Real-Time Control Protocol (RTCP) works in conjunction with RTP each participant in RTP session periodically sends RTCP control packets to all other participants each RTCP packet contains sender and/or

More information

Link Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.

Link Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5. Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link Virtualization:

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Medium Access Control

Medium Access Control Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless

More information

Home Area Networks. Outline

Home Area Networks. Outline Home Area Networks CS 687 University of Kentucky Fall 2015 Acknowledgment: Some slides are adapted from the slides distributed with the book Computer Networking: A Top Down Approach, 5th edition. Jim Kurose,

More information

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1. Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Communication Networks: Wireless and Mobile Communication Networks. Prof. Amir Herzberg BIU, Dept. of CS

Communication Networks: Wireless and Mobile Communication Networks. Prof. Amir Herzberg BIU, Dept. of CS 89-850 Communication Networks: Wireless and Mobile Communication Networks Prof. Amir Herzberg BIU, Dept. of CS From ch.6 of Kurose and Ross, 3 rd edition; and [KMK], ch. 8. All material copyright 1996-2004

More information

(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind)

(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind) (Wireless) Internet Routing Review of Wireless Networking (with Routing in Mind) 1 Review of Wireless Networking Architecture of wireless networks Wireless PHY Wireless MAC o 802.11 PHY: physical layer

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack Data Link Protocols TCP/IP Suite and OSI Reference Model The TCP/IP protocol stack does not define the lower layers of a complete protocol stack In this lecture, we will address how the TCP/IP protocol

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Data Link Layer: Multi Access Protocols

Data Link Layer: Multi Access Protocols Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top

More information

COSC : mobility within same subnet. Lecture 26. H1 remains in same IP subnet: IP address can remain same

COSC : mobility within same subnet. Lecture 26. H1 remains in same IP subnet: IP address can remain same Lecture 26 802.11: mobility within same subnet H1 remains in same IP subnet: IP address can remain same switch: which AP is associated with H1? self learning (Ch. 5): switch will see frame from H1 and

More information

Wireless Network and Mobility

Wireless Network and Mobility Wireless Network and Mobility Dept. of Computer Science, University of Rochester 2008-11-17 CSC 257/457 - Fall 2008 1 Wireless Networks and Mobility Wireless networking in the data link layer Short range:

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Multimedia networking: outline

Multimedia networking: outline Multimedia networking: outline 7.1 multimedia networking applications 7.2 streaming stored video 7.3 voice-over-ip 7.4 protocols for real-time conversational applications: RTP, SIP 7.5 network support

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking

Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Last time Router internals Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Mobility Home, visited s Home, foreign agents Permanent, care-of

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

CSC 498R: Internet of Things 2

CSC 498R: Internet of Things 2 CSC 498R: Internet of Things Lecture 04: Wireless Networks Instructor: Haidar M. Harmanani IoT Components Things we connect: Hardware, sensors and actuators Connectivity Medium we use to connect things

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Master Kurs Rechnernetze Computer Networks IN2097

Master Kurs Rechnernetze Computer Networks IN2097 Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle, Dr. Fuhrmann Master Kurs Rechnernetze Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Dr. Thomas Fuhrmann

More information

Cellular Networks and Mobility

Cellular Networks and Mobility Cellular Networks and Mobility Daniel Zappala CS 460 Computer Networking Brigham Young University Cellular Networks GSM 2G/3G Architecture 3/20 2G Standard 4/20 GSM: combined FDM/TDM divide into 200 khz

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information