Already finished all layers in the stack, why a separate chapter for wireless and mobile networks?
|
|
- Gerard Allison
- 5 years ago
- Views:
Transcription
1 Wireless and Mobile Networks Yanmin Zhu Department of Computer Science and Engineering Mobile lobal ISP Home Regional ISP Institutional Already finished all layers in the stack, why a separate chapter for wireless and mobile s? Key differences: Wireless and mobile Considering wireless, what shall be different on link layer, layer, transport layer and application layer? Considering mobility, what shall be different on link layer, layer, transport layer and application layer? 7. Introduction 7. Wireless links and 7. WiFi: 80. wireless LANs 7. Cellular Access 7. Introduction 7. Wireless links and 7. WiFi: 80. wireless LANs 7. Cellular Access 5 6
2 Elements of a wireless Elements of a wireless infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility infrastructure base station typically connected to wired relay -responsible for sending packets between wired and wireless host(s) in its area e.g., cell towers, 80. access points 7 8 Elements of a wireless Characteristics of wireless standards infrastructure wireless link typically used to connect mobile(s) to base station also used as backbone link multiple access protocol coordinates link access various data rates, transmission distance ac a,g 80.b Data rate (Mbps)50 80.n 80.a,g point-to-point : LTWE WIMAX : UMTS/WCDMA-HSPDA, CDMA000-xEVDO.5: UMTS/WCDMA, CDMA000 : IS-95, CDMA, SM 9 Indoor 0-0m Outdoor 50-00m Mid-range outdoor 00m Km Long-range outdoor 5Km 0 Km 0 Modes of wireless infrastructure infrastructure mode base station connects mobiles into wired handoff: mobile changes base station providing connection into wired Modes of wireless ad hoc mode no base stations nodes can only transmit to other nodes within link coverage nodes organize themselves into a : route among themselves
3 Wireless taxonomy Mesh Networks infrastructure (e.g., s) no infrastructure single hop host connects to base station (WiFi, WiMAX, cellular) which connects to larger no base station, no connection to larger (Bluetooth, ad hoc nets) multiple hops host may have to relay through several wireless nodes to connect to larger : mesh net no base station, no connection to larger. May have to relay to reach other a given wireless node MANET, VANET Vehicular Ad Hoc Networks Why VANET? VV IV VI Introduction 7. Wireless links and 7. WiFi: 80. wireless LANs 7. Cellular Access Wireless Link Characteristics () Differences from wired link decreased signal strength: radio signal attenuates as it propagates through matter (path loss) interference from other sources: standardized wireless frequencies (e.g.,. Hz) shared by other devices (e.g., phone); devices (motors) interfere as well multipath propagation: radio signal reflects off objects ground, arriving ad destination at slightly different times Thus, these differences make communication across (even a point to point) wireless link much more difficult 7 8
4 Wireless Link Characteristics () FDMA, TDMA, CDMA SNR: signal-to-noise ratio larger SNR easier to extract signal from noise (a good thing ) SNR versus BER tradeoffs given physical layer: increase power -> increase SNR->decrease BER given SNR: choose physical layer that meets BER requirement, giving highest thruput SNR may change with mobility: dynamically adapt physical layer (modulation technique, rate) BER SNR(dB) QAM56 (8 Mbps) QAM6 ( Mbps) BPSK ( Mbps) 9 0 Basic Idea of CDMA CDMA Encode/Decode: One Sender Code Division Multiple Access (CDMA) unique code assigned to each user; i.e., code set partitioning all users share same frequency, but each user uses own code to encode data A receiver uses the sender s code to recover the sent bits encoded signal = (original data) X (chipping sequence) decoding: inner-product of encoded signal and chipping sequence sender receiver data bits d = - Z i,m = d i. c m d 0 = code slot slot 0 received input code slot slot 0 channel output Z i,m slot channel output slot 0 channel output d = - slot channel output M D i = Z i,m. c m m= d 0 = slot 0 channel output M CDMA Encode/Decode: Tow Senders A 0 CDMA A B C What C transmits? E B D SCENARIO 0 Reception from A SCENARIO SCENARIO Code of A
5 Codes 7. Introduction 7. Wireless links and 7. WiFi: 80. wireless LANs 7. Cellular Access 5 6 IEEE 80. Wireless LAN WLAN architecture 80.b 80.a.-5 Hz unlicensed spectrum 5-6 Hz range up to Mbps up to 5 Mbps direct sequence spread 80.g spectrum (DSSS) in physical.-5 Hz range layer up to 5 Mbps all hosts use same chipping 80.n: multiple antennae code.-5 Hz range up to 00 Mbps all use CSMA/CA for multiple access BSS switch or router wireless host communicates with base station base station = access point () Basic Service Set (BSS) (aka cell ) in infrastructure mode contains: wireless hosts access point (): base station ad hoc mode: hosts only all have base-station and ad-hoc versions 7 BSS 8 80.b Channels Association before Transmission 80.b:.Hz-.85Hz spectrum divided into channels at different frequencies admin chooses frequency for interference possible: channel can be same as that chosen by neighboring! host: must associate with an scans channels, listening for beacon frames containing s name (SSID) and MAC selects to associate with may perform authentication will typically run DHCP to get IP in s subnet Question: what is the maximum throughput if you deploy multiple WiFi s in a room? 9 0 5
6 Two types: passive/active scanning Multiple Access for Wireless Channel BBS BBS BBS BBS H H Passive Scanning: () beacon frames sent from s ()association Request frame sent: H to selected ()association Response frame sent: H to selected Active Scanning: () Probe Request frame broadcast from H ()Probes response frame sent from s ()Association Request frame sent: H to selected ()Association Response frame sent: H to selected H H H CSMA may fail! Why? Due to Hidden Terminal Problem! Multiple access control protocol BSS A B C A B C A s signal strength space C s signal strength H H H A->B C->B Collision happen at B A transmits C transmits time time avoid collisions: + nodes transmitting at same time CSMA - sense before transmitting don t collide with ongoing transmission by other node CSMA for 80. WiFi CSMA vs Ethernet Protocol operations () Sense the channel a) If idle for DIFS, transmit entire frame (no CD), wait for ACK b) If busy - start random backoff time - timer counts down while channel idle - transmit when timer expires () Wait for ACK a) If ACK received, done b) If no ACK, increase random backoff interval, repeat DIFS sender data ACK receiver SIFS 5 What are the key differences? () WiFi has ACK, since radio links are more error prone () WiFi starts random backoff as soon as it senses a busy channel, why? No collision detection. More conservative! But no collision detection, Why? a. Difficult to receive while transmitting b. Anyway, cannot detect all collisions, due to hidden terminal problem 6 6
7 Avoiding collisions (more) Collision Avoidance: RTS-CTS exchange idea: allow sender to reserve channel rather than random access of data frames: avoid collisions of long data frames A B sender first transmits small request-to-send (RTS) packets to BS using CSMA RTSs may still collide with each other (but they re short) BS broadcasts clear-to-send (CTS) in response to RTS CTS heard by all nodes sender transmits data frame other stations defer transmissions time DATA (A) reservation collision defer avoid data frame collisions completely using small reservation packets! 7 8 Network allocation vector (NAV) Two Animations DEMO DEMO 9 0 Three Modes of Service Sets Three Modes of Service Sets Mode : Independent Basic Service Set (IBSS) Independent Basic Service Set (IBSS) allows two or more devices to communicate directly with each other without a need for a central device Mode : Basic Service Set (BSS) All mobile devices do not communicate directly, instead through the access point (). BSS H H H H H H 7
8 Three Modes of Service Sets 80.: mobility within same subnet Mode : Extended Service Set (ESS) ESS is created by connecting multiple Basic Service Set (BSS) via a distribution system SSID: sameid H H H switch H5 SSID: sameid H H remains in same IP subnet: IP can remain same switch: which is associated with H? self-learning (Ch. 5): switch will see frame from H and remember which switch port can be used to reach H ood, but what about switching? BBS router switch H BBS BSS BSS 80. frame: ing Sending Frames between H & R frame control duration seq control payload CRC Address : MAC of wireless host or to receive this frame Address : MAC of router interface to which is attached Address : used only in ad hoc mode Note: Two link-layer technologies Address : MAC of wireless host or transmitting this frame frame: ing 80. frame: ing H router R H router R H MAC addr R MAC addr R MAC addr H MAC addr dest. source dest. source 80. frame 80. frame H MAC addr MAC addr R MAC addr Frame conversion MAC addr H MAC addr R MAC addr Frame conversion 80. frame 80. frame 7 8 8
9 80. frame: more 80.: advanced capabilities Byte Bit frame control Protocol version duration Type duration of reserved transmission time (RTS/CTS) Subtype To From seq control More frag Retry frame seq # (for RDT) Power mgt payload frame type (RTS, CTS, ACK, data) More data WEP CRC Rsvd 9 Rate Adaptation base station, mobile dynamically change transmission rate (physical layer modulation technique) as mobile moves, SNR varies QAM56 (8 Mbps) QAM6 ( Mbps) BPSK ( Mbps) operating point BER SNR(dB). SNR decreases, BER increase as node moves away from base station. When BER becomes too high, switch to lower transmission rate but with lower BER : advanced capabilities 80.: advanced capabilities Power Management node-to-: I am going to sleep until next beacon frame knows not to transmit frames to this node node wakes up before next beacon frame beacon frame: contains list of mobiles with -tomobile frames waiting to be sent node will stay awake if -to-mobile frames to be sent; otherwise sleep again until next beacon frame A A beacon beacon beacon beacon The beacon frame contains the list of hosts with pending frames to receive B A, B 5 5 From to 7. Introduction 7. Wireless links and 7. WiFi: 80. wireless LANs 7. Cellular Access 5 5 9
10 Components of cellular cell covers geographical region base station (BS) analogous to 80. mobile users attach to through BS air-interface: physical and link layer protocol between mobile and BS connects cells to wired tel. net. manages call setup (more later!) handles mobility (more later!) Mobile Switching Center Mobile Switching Center telephone wired 55 Cellular s: the first hop Two techniques for sharing mobile-to-bs radio spectrum combined FDMA/TDMA: divide spectrum in frequency channels, divide each channel into time slots CDMA: code division multiple access frequency bands time slots 56 (voice) architecture Base station system (BSS) BTS BSC Legend ateway Base transceiver station (BTS) Base station controller (BSC) Mobile Switching Center () Mobile subscribers telephone 57 (voice+data) architecture radio controller Key insight: new cellular data operates in parallel (except at edge) with existing cellular voice voice unchanged in core data operates in parallel SSN telephone ateway SN Serving PRS Support Node (SSN) ateway PRS Support Node (SN) 58 (voice+data) architecture radio controller radio interface (WCDMA, HSPA) radio access Universal Terrestrial Radio Access Network (UTRAN) SSN core eneral Packet Radio Service (PRS) Core Network ateway SN telephone public 59 versus LTE architecture -LTE radio access Universal Terrestrial Radio Access Network (UTRAN) radio controller SSN HSS MME Evolved Packet Core (EPC) ateway SN S-W P-W telephone
11 : differences from all IP core: IP packets tunneled (through core IP ) from base station to gateway no separation between voice and data all traffic carried over IP core to gateway Mobility Home Subscriber Management Server(HSS) Serving Entity (MME) (like HLR+VLR) UE enodeb ateway (user element) (base station) HSS (S-W) MME radio access Universal Terrestrial Radio Access Network (UTRAN) data Evolved Packet Core (EPC) S-W P-W Packet data ateway (P-W) 7-6 Wireless and Mobile Networks 7. Introduction 7. Wireless links and 7. WiFi: 80. wireless LANs 7. Cellular Access 6 What is mobility? spectrum of mobility, from the perspective: no mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. high mobility mobile user, passing through multiple access points while maintaining ongoing connections (like cell phone) How do we support mobile access? 6 6 Mobility: Vocabulary Mobility: more vocabulary home : permanent home of mobile (e.g., 8.9.0/) home agent: entity that will perform mobility functions on behalf of mobile, when mobile is remote Permanent : remains constant (e.g., ) Care-of-: in visited. (e.g., ) visited : in which mobile currently resides (e.g., 79.9./) Permanent : in home, can always be used to reach mobile e.g., wide area 65 : wants to communicate with mobile wide area foreign agent: entity in visited that performs mobility functions on behalf of mobile. 66
12 How do you contact a mobile friend? Mobility: approaches () Consider friend frequently changing es, how do you find her? search all phone books? call her parents? expect her to let you know where he/she is? I wonder where Alice moved to? Let routing handle it (the core approach): routers advertise permanent of mobile-nodes-in-residence via usual routing table exchange. routing tables indicate where each mobile located no changes to end-systems not scalable to millions of mobiles Mobility: approaches () let end-systems handle it: indirect routing: communication from to mobile goes through home agent, then forwarded to remote direct routing: gets foreign of mobile, sends directly to mobile Mobility: registration home wide area Eventually: Foreign agent knows about mobile Home agent knows location of mobile foreign agent contacts home agent home: this mobile is resident in my visited mobile contacts foreign agent on entering visited Mobility via Indirect Routing Indirect Routing home es packets using home of mobile home agent intercepts packets, forwards to foreign agent wide area foreign agent receives packets, forwards to mobile visited mobile replies directly to corresponde nt 7 Mobile uses two es: permanent : used by (hence mobile location is transparent to ) care-of-: used by home agent to forward datagrams to mobile foreign agent functions may be done by mobile itself 7
13 Can a mobile move to another? Indirect routing, any problem? suppose mobile user moves to another ) registers with new foreign agent ) new foreign agent registers with home agent ) home agent update care-of- for mobile ) packets continue to be forwarded to mobile (but with new care-of-) mobility, changing foreign s transparent: ongoing connections can be maintained! triangle routing problem: -home-mobile inefficient when, mobile are in same 7 7 Mobility via Direct Routing home requests, receives foreign of mobile forwards to foreign agent wide area foreign agent receives packets, forwards to mobile visited mobile replies directly to corresponde nt 75 Mobility via Direct Routing: comments overcome triangle routing problem non-transparent to : must get care-of- from home agent what if mobile changes visited? 76 Any new problem arise? Accommodating mobility with direct routing anchor foreign agent: FA in first visited data always routed first to anchor FA when mobile moves: new FA arranges to have data forwarded from old FA new foreign agent new foreign wide area anchor foreign agent agent 5 new foreign agent foreign net visited at session start new foreign 77 78
14 7. Introduction 7. Wireless links and 7. WiFi: 80. wireless LANs 7. Cellular Access Mobile IP RFC has many features we ve seen: home agents, foreign agents, foreign-agent registration, care-of-es, encapsulation (packetwithin-a-packet) three components to standard: indirect routing of datagrams agent discovery registration with home agent Mobile IP: indirect routing Mobile IP: agent discovery packet sent by home agent to foreign agent: a packet within a packet foreign-agent-to-mobile packet dest: agent advertisement: foreign/home agents advertise service by broadcasting ICMP messages (typefield = 9) dest: dest: type = 9 code = 0 checksum Permanent : dest: packet sent by Care-of : H,F bits: home and/or foreign agent R bit: registration required router type = 6 length sequence # RBHFMV registration lifetime reserved bits 0 or more care-ofes standard ICMP fields mobility agent advertisement extension 8 8 Mobile IP: registration example home agent HA: time foreign agent COA: registration req. COA: HA: MA: Lifetime: 9999 identification: 7 encapsulation format. registration reply HA: MA: Lifetime: 999 Identification: 7 encapsulation format. visited : 79.9./ ICMP agent adv. Mobile agent COA: MA: registration req. COA: HA: MA: Lifetime: 9999 identification:7. registration reply HA: MA: Lifetime: 999 Identification: Introduction 7. Wireless links and 7. WiFi: 80. wireless LANs 7. Cellular Access 8 8
15 Components of cellular Handling mobility in cellular s recall: wired public telephone home : of cellular provider you subscribe to (e.g., Sprint PCS, Verizon) home location register (HLR): database in home containing permanent cell phone #, profile information (services, preferences, billing), information about current location (could be in another ) different cellular s, operated by different providers visited : in which mobile currently resides visitor location register (VLR): database with entry for each user currently in could be home SM: indirect routing to mobile SM: handoff with common home consults HLR, gets roaming number of mobile in visited mobile user HLR home home Mobile Switching Center VLR Mobile Switching Center visited call routed to home switched telephone home sets up nd leg of call to in visited in visited completes call through base station to mobile old BSS VLR Mobile Switching Center old routing new routing new BSS Handoff goal: route call via new base station (without interruption) reasons for handoff: stronger signal to/from new BSS (continuing connectivity, less battery drain) load balance: free up channel in current BSS SM doesn t mandate why to perform handoff (policy), only how (mechanism) handoff initiated by old BSS SM: handoff with common SM: handoff between s old BSS VLR Mobile Switching Center new BSS. old BSS informs of impending handoff, provides list of + new BSSs. sets up path (allocates resources) to new BSS. new BSS allocates radio channel for use by mobile. new BSS signals, old BSS: ready 5. old BSS tells mobile: perform handoff to new BSS 7. mobile, new BSS signal to activate new channel 7. mobile signals via new BSS to : handoff complete. reroutes call 8 -old-bss resources released home Home anchor PSTN (a) before handoff anchor : first visited during call call remains routed through anchor new s add on to end of chain as mobile moves to new IS- allows optional path minimization step to shorten multi- chain
16 SM: handoff between s Mobility: SM versus Mobile IP SM element Comment on SM element Mobile IP element home Home anchor PSTN (b) after handoff anchor : first visited during call call remains routed through anchor new s add on to end of chain as mobile moves to new IS- allows optional path minimization step to shorten multi- chain 9 Home system ateway Mobile Switching Center, or home. Home Location Register (HLR) Visited System Visited Mobile services Switching Center. Visitor Location Record (VLR) Mobile Station Roaming Number (MSRN), or roaming number Network to which mobile user s permanent phone number belongs Home : point of contact to obtain routable of mobile user. HLR: database in home system containing permanent phone number, profile information, current location of mobile user, subscription information Network other than home system where mobile user is currently residing Visited : responsible for setting up calls to/from mobile nodes in cells associated with. VLR: temporary database entry in visited system, containing subscription information for each visiting mobile user Routable for telephone call segment between home and visited, visible to neither the mobile nor the. Home Home agent Visited Foreign agent Care-of 9 7. Introduction 7. Wireless links and 7. WiFi: 80. wireless LANs 7. Cellular Access What is the impact of wireless links and mobility on high layer protocols? 9 9 Wireless, mobility: impact on higher layer protocols Chapter 7 summary logically, impact should be minimal best effort service model remains unchanged TCP and UDP can (and do) run over wireless, mobile but performance-wise: packet loss/delay due to bit-errors (discarded packets, delays for link-layer retransmissions), and handoff TCP interprets loss as congestion, will decrease congestion window un-necessarily delay impairments for real-time traffic limited bandwidth of wireless links Wireless wireless links: capacity, distance channel impairments CDMA IEEE 80. ( Wi- Fi ) CSMA/CA reflects wireless channel cellular access architecture standards (e.g., SM,, LTE) Mobility principles: ing, routing to mobile users home, visited s direct, indirect routing care-of-es case studies mobile IP mobility in SM impact on higher-layer protocols
17 Homework #6 Lab #6 Chapter 6: P5, P0, P, P Chapter 7 : P, P7, P, P 80. Lab No submission is required!
CSCI-1680 Wireless Chen Avin
CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationMobility: vocabulary
What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationCSC 4900 Computer Networks: Mobility
CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationCPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts
1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number
More informationCSC 8560 Computer Networks: Wireless and Mobility
CSC 8560 Computer Networks: Wireless and Mobility Professor Henry Carter Fall 2017 Chapter 7: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers!
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach. Andrei Gurtov
Chapter 7 Wireless and Mobile Networks Andrei Gurtov All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith
More informationChapter 6 Wireless and Mobile Networks (Wireless and Mobility)
CSF645 Mobile Computing 行動計算 Chapter 6 Wireless and Mobile Networks (Wireless and Mobility) Computer Networking: A Top Down Approach 6 th edition, Jim Kurose, Keith Ross 吳俊興國立高雄大學資訊工程學系 outline 6.1 Introduction
More informationLecture 15 Wireless and Mobility
Lecture 15 Wireless and Mobility From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright 1996-2016 J.F Kurose and K.W. Ross,
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationCS 332 Computer Networks Wireless Networks
CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationChapter 7. Wireless and Mobile Networks 7-1
Chapter 7 Wireless and Mobile Networks A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see
More informationModule 6: Wireless Mobile Networks
Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links
More informationWireless and Mobile Networks
Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals # wireline Internet-connected
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Reading Guide: Chapter 6: 6.1 6.4 1 Ch. 6: Wireless and Mobile Networks Background: v # wireless (mobile) phone subscribers now exceeds # wired
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
More informationChapter 3: Wireless and Mobile Networks
Computer Network Architectures and Multimedia Guy Leduc Chapter 3 Wireless and Mobile Networks Chapter 7 of Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationChapter 5 Wireless and Mobile Networks
Chapter 5 Wireless and Mobile Networks Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Wireless and Mobile Networks Chapter 5: Wireless
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationWireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationNo lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after.
Administrivia No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after. 1 CSMA/CA: Recap Sensing in wireless medium is limited
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add,
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationWireless Security Background
Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network
Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More information3/20/2012. Data Communications & Networks. Session 5 Main Theme. 2 Wireless and Mobile Networks. Dr. Jean-Claude Franchitti
Data Communications & Networks Session 5 Main Theme Wireless and Mobile Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: The notes used in this course are substantially based on powerpoint slides developed and copyrighted by J.F. Kurose and K.W.
More informationMobile devices for wireless
Mobile devices for wireless Wireless sensors Limited proc. power Small battery Laptop functionally eq. to desktop standard applications TDTS04/09 Föreläsning 0/6: WLAN och TCP i trådlösa nät RFID tag A
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in
More informationCOSC : mobility within same subnet. Lecture 26. H1 remains in same IP subnet: IP address can remain same
Lecture 26 802.11: mobility within same subnet H1 remains in same IP subnet: IP address can remain same switch: which AP is associated with H1? self learning (Ch. 5): switch will see frame from H1 and
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationElements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network
wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected to wired relay - responsible for sending
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.
Chapter 6 Wireless and obile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Chapter 6: Wireless and obile Networks
More informationHome Area Networks. Outline
Home Area Networks CS 687 University of Kentucky Fall 2015 Acknowledgment: Some slides are adapted from the slides distributed with the book Computer Networking: A Top Down Approach, 5th edition. Jim Kurose,
More informationElements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network
Elements of a wireless Elements of a wireless wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected
More informationLast time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling
Last time BGP policy Broadcast / multicast routing Spanning trees Source-based, group-shared, center-based Reverse path forwarding, pruning Tunneling Link virtualization Whole networks can act as an Internet
More informationM06:Wireless and Mobile Networks. Corinna Schmitt
M06:Wireless and Mobile Networks Corinna Schmitt corinna.schmitt@unibas.ch Acknowledgement 2016 M06 2 Background q # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)!
More informationCommunication Networks: Wireless and Mobile Communication Networks. Prof. Amir Herzberg BIU, Dept. of CS
89-850 Communication Networks: Wireless and Mobile Communication Networks Prof. Amir Herzberg BIU, Dept. of CS From ch.6 of Kurose and Ross, 3 rd edition; and [KMK], ch. 8. All material copyright 1996-2004
More informationInput ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking
Last time Router internals Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Mobility Home, visited s Home, foreign agents Permanent, care-of
More informationMedium Access Control
Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationComputer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the
Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationReti degli elaboratori
Reti degli elaboratori Dealing with Mobility; Bluetooth Basics Chiara Petrioli petrioli@di.uniroma1.it What is mobility? v spectrum of mobility, from the network perspective: no mobility high mobility
More informationAnnouncements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday
ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui
More informationChapter 6. Wireless and Mobile Networks. IEEE : personal area network : WiMAX: downlink, uplink scheduling
Chapter 6 Wireless and Networks Part II IEEE 802.15: personal area less than 10 m diameter replacement for cables (mouse, keyboard, headphones) ad hoc: no infrastructure master/slaves: slaves request permission
More informationWireless Internet Routing. Review of Wireless Networking (with Routing in Mind)
Wireless Internet Routing Review of Wireless Networking (with Routing in Mind) 1 Review of Wireless Networking Architecture of wireless networks Wireless PHY Wireless MAC o 802.11 PHY: physical layer /
More informationExtending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.
Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just
More informationLink Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link Virtualization:
More informationCS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.
CS118 Discussion 1A, Week 9 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Wireless: 802.11 Mobile IP Cellular Networks: LTE Sample final 2 Wireless and Mobile Network Wireless access: WIFI
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationWireless Network and Mobility
Wireless Network and Mobility Dept. of Computer Science, University of Rochester 2008-11-17 CSC 257/457 - Fall 2008 1 Wireless Networks and Mobility Wireless networking in the data link layer Short range:
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-09/
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More information(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind)
(Wireless) Internet Routing Review of Wireless Networking (with Routing in Mind) 1 Review of Wireless Networking Architecture of wireless networks Wireless PHY Wireless MAC o 802.11 PHY: physical layer
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationCSC 498R: Internet of Things 2
CSC 498R: Internet of Things Lecture 04: Wireless Networks Instructor: Haidar M. Harmanani IoT Components Things we connect: Hardware, sensors and actuators Connectivity Medium we use to connect things
More informationECS-087: Mobile Computing
ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:
More informationBlock 3: Lecture 1! Part 3: Lecture 1! Wireless networks!
Block 3: Lecture 1 Part 3: Lecture 1 Wireless networks Part 3 Wireless and mobile networks: 1. Wireless technologies 2. Mobility 3. Fiber day on Friday May 22nd Long time ago... Marconi invented the wireless
More informationAnnouncements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7
ECE/CS 372 introduction to computer networks Announcements: Assignment 4 due now Chapter 7 Acknowledgement: slides drawn heavily from Kurose & Ross and Prof. Bechir Hamdaoui Chapter 7, slide 1 Wireless
More informationAnnouncements: ECE/CS 372 introduction to computer networks. Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon
ECE/CS 372 introduction to computer networks Lecture 14 Announcements: Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon Credit for lecture slides to Professor Bechir Hamdaoui
More informationCellular Networks and Mobility
Cellular Networks and Mobility Daniel Zappala CS 460 Computer Networking Brigham Young University Cellular Networks GSM 2G/3G Architecture 3/20 2G Standard 4/20 GSM: combined FDM/TDM divide into 200 khz
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationLast time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3!
20/05/14 Last time? WiFi Block 3: Lecture 1 Part 3: lecture 3 Wireless s Speed and ranges and channels Specifications DCF mechanisms WiMax Mobile s Ingredients 1: Mobile Phones, PDAs & Co. Ingredients
More informationInternet Services & Protocols. Mobile and Wireless Networks
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Mobile and Wireless Networks Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More informationWhat is mobility? Mobile IP. Mobility Impact on Protocol Stack (cont.) Advanced Topics in Computer Networks
Advanced Topics in Computer Networks What is mobility? spectrum of mobility, from the perspective: Mobile IP no mobility high mobility Chalermek Intanagonwiwat Slides courtesy of James F. Kurose, Keith
More informationCarrier Wave! Signals! Modulation! Internet Protocol Stack!
Internet Protocol Stack! Carrier Wave! application: supporting network applications!! HTTP, SMTP, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams from source
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationChapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees
Chapter 4 roadmap 4. Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What s Inside a Router 4.4 The Internet (IP) Protocol 4.5 Routing Algorithms 4.6 Routing in the Internet 4.7
More information