CMPE 257: Wireless and Mobile Networking

Size: px
Start display at page:

Download "CMPE 257: Wireless and Mobile Networking"

Transcription

1 CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 5 CMPE 257 Winter'11 1

2 Announcements Project proposals. Student presentations. 10 students so we need 5 lectures. 2 students per lecture. Topics: Security. Mobility management. Hybrid networks. Energy management. DTNs CMPE 257 Winter'11 2

3 Today Finish MAC. Unicast routing. CMPE 257 Winter'11 3

4 IEEE Provides 2 types of medium access: DCF: distributed coordination function. PCF: point coordination function. DCF is contention-based. PCF is polling-based. Collision free. Implemented atop DCF. PCF DCF CMPE 257 Winter'11 4

5 IEEE DCF Physical carrier sensing: Stations listen to channel before transmitting (CS of CSMA/CA). Virtual carrier sensing: CA OF CSMA/CA. Reserve channel for transmission. Use RTS/CTS handshake. CMPE 257 Winter'11 5

6 IEEE MAC Protocol: CSMA sender (no CA) 1 if sense channel idle for DIFS then transmit entire frame (no CD) 2 if sense channel busy then start random backoff time timer counts down while channel idle transmit when timer expires if no ACK, increase random backoff interval, repeat receiver DIFS sender data ACK receiver SIFS - if frame received OK return ACK after SIFS (ACK needed due to hidden terminal problem) CMPE 257 Winter'11 6

7 IEEE MAC Protocol: CSMA/CA Physical CS + virtual CS. Sense channel for DIFS. RTS/CTS handshake before sending data. RTS is 20 bytes and CTS is 16 bytes. Maximum data frame is 2,346 bytes. Note: This is only for unicast transmissions. Broadcast Transmissions do not use virtual carrier sensing. CMPE 257 Winter'11 7

8 CSMA-CA Examples F D A C B E Scenario: A wants to transmit to C.. A sends RTS.. D defers.. C sends CTS.. B defers. CMPE 257 Winter'11 8

9 IEEE Wireless LAN b GHz unlicensed spectrum up to 11 Mbps direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code a 5-6 GHz range up to 54 Mbps g GHz range up to 54 Mbps n: multiple antennae GHz range up to 200 Mbps All use CSMA/CA for multiple access. All have base-station and ad-hoc network modes. CMPE 257 Winter'11 9

10 CSMA Variants 1-persistent (IEEE 802.3): If medium idle, transmit. If medium busy, keep listening; when medium idle, transmit with probability 1. p-persistent: Same as above but with probability p. Non-presistent: If medium idle, transmit. If medium busy, wait a random period before retrying. CMPE 257 Winter'11 10

11 MAC: A Bird s Eye View CMPE 257 Winter'11 11

12 Solutions to Hidden/Exposed Nodes in CSMA Use only virtual CS: RTS/CTS (Request-To-Send/Clear-To-Send) Used by MACA (Multiple Access Control Avoidance) and MACAW (MACA for Wireless LANs). Use both physical- and virtual CS: CSMA/CA, IEEE CMPE 257 Winter'11 12

13 Dynamic Reservation Approaches: Sender- vs. Receiver-initiated Sender-initiated: A node wanting to send data takes the initiative of setting up the reservation. Most existing schemes. Receiver-initiated: A receiving node polls a potential transmitting node for data. A node can send data after being polled. E.g., MACA-By Invitation. CMPE 257 Winter'11 13

14 Single vs. Multiple Channel Protocols Single channel protocols: control and data use the same channel. Multiple channel protocols: separate channels for control & data transmission; data transmission on separate channels. CMPE 257 Winter'11 14

15 Other criteria for classification Power-aware. E.g., PAMAS. Directional or omnidirectional antennas. QoS-aware End-to-end (E2E) delay Packet loss rate (or the probability) Available bandwidth Challenges: lack of centralized control, limited bandwidth, node mobility, power/computational constraints, error-prone nature of wireless media. CMPE 257 Winter'11 15

16 MACAW [Bharghavan, 1994]. Proposed as improvement to MACA [Karn, 1990]. Note that first IEEE standard (IEEE legacy ) released in CMPE 257 Winter'11 16

17 MACA Proposed as alternative to CSMA. Introduced CA. RTS/CTS handshake (2-way). CMPE 257 Winter'11 17

18 MACA If node A wants to transmit to B, it first sends an RTS packet to B, indicating the length of the data transmission to follow. B returns a CTS packet to A with the expected length of the transmission. A starts transmission when it successfully receives CTS. RTS and CTS packets are much shorter than data packets. A neighboring node overhearing an RTS defers its own transmission until the corresponding CTS would have been finished. A node hearing the CTS defers for the expected length of the data transmission. CMPE 257 Winter'11 18

19 MACA (Cont d) Nodes close to sender: If no CTS heard, OK to transmit. Avoid exposed terminal problem: nodes that hear only RTS can transmit simultaneously with RTS sender. Nodes close to receiver: Upon hearing CTS, defer till after data. Avoid hidden terminal. Binary exponential backoff (BEB). Possible unfair channel allocation (starvation). CMPE 257 Winter'11 19

20 MACAW Inspired basic changes to MACA: Additional signaling. Modified backoff algorithm. CMPE 257 Winter'11 20

21 MACAW Backoff Tries to avoid BEB s unfairness. Proposed fix: sharing congestion information among nodes. Backoff counter information propagated in packet header. After successful transmission, neighbors have the same backoff counter. Tries to prevent large variations of the backoff value. Multiplicative increase (1.5), linear decrease (decremented by 1). CMPE 257 Winter'11 21

22 Data Transmission in MACAW Added ACK. Reliability at layer 2. If ACK not received: Retransmit frame. Increment backoff timer. CMPE 257 Winter'11 22

23 Data Transmission in MACAW Added small Data Sending (DS) control frame. Addresses exposed terminal problem. In MACA, exposed node (received RTS but not CTS) is allowed to transmit. Example: S1->R1 and S2->R2 CTS from R2 may collide with transmission S1->R1. S2 backs-off. Fix: make sure S2 knows RTS-CTS exchange between S1 and R1 was successful. S1 sends small control frame, DS with data exchange duration. When S2 receives DS, defers its transmission. R1 S1 S2 R2 CMPE 257 Winter'11 23

24 Data Transmission in MACAW Added Request for Request-to-Send (RRTS). R2 contends on behalf of S2 if it received RTS from S2 when it could not have responded because deferring due to S1->R1 exchange. When S2 receives RRTS from R2, proceeds with RTS, etc. RRTS RRTS S2 R2 R1 S1 CMPE 257 Winter'11 24

25 FAMA Protocols Floor Acquisition Multiple Access. Floor acquisition = gain control of channel. MACA is an example of a FAMA protocol.. Floor acquisition on packet-by-packet basis. No physical CS; only virtual CS. For collision freedom, RTS needs to be at least 2*channel-propagation-delay. CMPE 257 Winter'11 25

26 FAMA Paper (Garcia-Luna et al.) FAMA non-persistent packet sensing, or FAMA-NPS. No carrier sensing, i.e., MACA. Uses ALOHA to transmit RTS. CMPE 257 Winter'11 26

27 FAMA-NTR FAMA non-persistent transmit request. Sender can send packet bursts. Combines non-persistent CS + RTS/ CTS exchange. Enforces waiting periods at sender and receiver. For both data and control frames. Waiting period proportional to maximum propagation time. CMPE 257 Winter'11 27

28 FAMA-NTR (cont d) Before sending: Node senses channel. If channel busy, backs-off for random period and retries later => nonpersistent. If channel free, node sends RTS. Node waits CTS for 1 RTT. If CTS not received, node backs-off. Otherwise, transmits data burst (up to a maximum size). CMPE 257 Winter'11 28

29 FAMA-NTR To allow bursts, receiving station waits after processing each data packet. Waiting period (T) = maximum propagation time. Transmitting node waits for 2T after any control frame. Allows enough time for RTS-CTS exchange. CMPE 257 Winter'11 29

30 Unicast Routing in MANETs CMPE 257 Winter'11 30

31 Why MANET routing is challenging? No fixed infrastructure. Nodes can have unlimited mobility. So? Multiple hops to destination. Unreliable communication medium. All nodes need to participate in routing/ forwarding. Also, security issues. CMPE 257 Winter'11 31

32 Mobility Mobility patterns may vary widely. Stationary nodes (e.g., sensor nodes). Highly mobile nodes (e.g., vehicles). Discrete versus continuous mobility. Structured versus unstructured mobility. Mobility characteristics: Speed. Direction. Pause time. CMPE 257 Winter'11 32

33 MANET Routing Requirements Dissemination of routing information: Multi-hop paths. Loop free all the time, or almost loop-free. Limited signaling overhead. Self configuring, and adaptive to dynamic topology. Efficiency, e.g.,low consumption of communication bandwidth, energy. Scalable with number of nodes. Localized effect of topology or flow change. CMPE 257 Winter'11 33

34 MANET Unicast Routing Many protocols have been proposed. Many have been invented specifically for MANETs. Many are adapted from protocols for wired networks. Can any one protocol work well in all MANET environments? CMPE 257 Winter'11 34

35 DV or LS? CMPE 257 Winter'11 35

36 DV or LS? Distance-Vector Algorithm: Routers exchange their distances to known destinations; a router uses the distance vectors received from its neighbors to compute its own distances. Distributed computation is problem. Link-State Algorithm: Routers exchange information about the state of the links in the network; a router uses this information to compute its distances to destinations. Distributed database problem. CMPE 257 Winter'11 36

37 Proactive or Reactive? CMPE 257 Winter'11 37

38 MANET Unicast Routing Taxonomy Proactive protocols: A.k.a, table-driven. Traditional routing protocols are proactive. Compute and maintain routes independent on traffic demand/patterns. E.g., OLSR. Reactive protocols: Compute and maintain routes on-demand. E.g., DSR, AODV. Hybrid protocols. E.g., ZRP. CMPE 257 Winter'11 38

39 Tradeoffs? Latency of route discovery. Proactive protocols may have lower latency since routes are maintained at all times. Reactive protocols may have higher latency because a route from X to Y will be found only when X attempts to send to Y. CMPE 257 Winter'11 39

40 Tradeoffs? Overhead of route discovery/maintenance. Reactive protocols may have lower overhead because routes are determined only if needed. Proactive protocols may result in higher overhead due to continuous route updating (depends on rate of changes). Which approach achieves better trade-offs depends on the traffic and mobility patterns. CMPE 257 Winter'11 40

41 What about Flooding? CMPE 257 Winter'11 41

42 Flooding for Data Delivery Sender broadcasts data packet P to all its neighbors. Each node receiving P forwards it to its neighbors. Sequence numbers used to avoid forwarding P more than once. Why? P reaches destination if reachable from source. Destination does not forward P. CMPE 257 Winter'11 42

43 Flooding CMPE 257 Winter'11 43

44 Flooding CMPE 257 Winter'11 44

45 Flooding Advantages: Simplicity. Efficient when rate of information transmission lower than topology changes. Robustness. Disadvantages: High overhead. May result in network congetion. CMPE 257 Winter'11 45

46 Flooding for the Control Plane Many protocols perform flooding of control packets. E.g., route discovery and maintenance. Overhead of control packet flooding may be amortized over data packets transmitted. CMPE 257 Winter'11 46

47 Dynamic Source Routing (DSR) [Johnson96] Reactive protocol. When node S wants to send a packet to D, and does not have a route to D, node S initiates a route discovery. S floods Route Request (RREQ). Each node appends own identifier when forwarding RREQ. CMPE 257 Winter'11 47

48 Route Discovery in DSR Y Z S E A B H C I G F K J D M N L Represents a node that has received RREQ for D from S CMPE 257 Winter'11 48

49 Route Discovery in DSR Y Broadcast transmission [S] Z S E A B H C I G F K J D M N L Represents transmission of RREQ [X,Y] Represents list of identifiers appended to RREQ CMPE 257 Winter'11 49

50 Route Discovery in DSR Y S E [S,E] Z A B H C [S,C] I G F K J D M N L Node H receives packet RREQ from two neighbors: potential for collision CMPE 257 Winter'11 50

51 Route Discovery in DSR Y Z S E A B H C I G F [S,C,G] [S,E,F] K J D M N L Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once CMPE 257 Winter'11 51

52 Route Discovery in DSR Y Z A B H S C I E G F K [S,E,F,J] M J D [S,C,G,K] N L Nodes J and K both broadcast RREQ to node D Since nodes J and K are hidden from each other, their transmissions may collide CMPE 257 Winter'11 52

53 Route Discovery in DSR Y Z A B H S C I E G F K J [S,E,F,J,M] M L D N Node D does not forward RREQ, because node D is the intended target of the route discovery CMPE 257 Winter'11 53

54 Route Discovery in DSR Destination D on receiving the first RREQ, sends a Route Reply (RREP). RREP is sent on a route obtained by reversing the route appended to the received RREQ. RREP includes the route from S to D on which RREQ was received by node D. CMPE 257 Winter'11 54

55 Route Reply in DSR Y S E RREP [S,E,F,J,D] Z A B H C I G F K J M D N L Represents RREP control message CMPE 257 Winter'11 55

56 Route Reply in DSR RREP can be sent by reversing the route in RREQ only if links are guaranteed to be bi-directional If unidirectional (asymmetric) links are allowed, then RREP may need a route discovery for S from D. Unless D already knows a route to S. If a route discovery is initiated by D for a route to S, then the RREP is piggybacked on D s RREQ. CMPE 257 Winter'11 56

57 Processing RREP Node S on receiving RREP, caches the route. When node S sends a data packet to D, the entire route is included in the packet header Hence the name source routing. Intermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded. CMPE 257 Winter'11 57

58 Data Delivery in DSR Y DATA [S,E,F,J,D] Z S E A B H C I G F K J D M N L Packet header size grows with route length CMPE 257 Winter'11 58

59 DSR Optimization: Route Caching Each node caches a new route it learns by any means. When node S finds route [S,E,F,J,D] to node D, node S also learns route [S,E,F] to node F. When node K receives Route Request [S,C,G], K learns route [K,G,C,S] to S. When node F forwards Route Reply RREP [S,E,F,J,D], F learns route [F,J,D] to D. When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D] to node D Nodes may also learn route when it overhears data. CMPE 257 Winter'11 59

60 Use of Route Caching When S learns that a route to D is broken, it uses another route from its local cache, if such a route to D exists in its cache; otherwise, S initiates route discovery. Node X on receiving a RREQ for some node D can send a RREP if X knows a route to D. Use of route cache Can speed up route discovery. Can reduce propagation of route requests. CMPE 257 Winter'11 60

61 Use of Route Caching [S,E,F,J,D] [E,F,J,D] S E [F,J,D],[F,E,S] A B H C [C,S] I G [G,C,S] F K [J,F,E,S] J D M N L Z [P,Q,R]: Represents cached route at a node CMPE 257 Winter'11 61

62 Route Caching: Speed up Route Discovery, Reduce RREQ Flooding A [S,E,F,J,D] B [C,S] [E,F,J,D] E [G,C,S] When node Z sends a route request for node C, node K sends back a route reply [Z,K,G,C] to node Z using a locally cached route H S C I G [F,J,D],[F,E,S] F [K,G,C,S] K RREQ [J,F,E,S] CMPE 257 Winter'11 62 J Z RREP D M N Route caches at K and J limit the flooding of Z s RREQ. L

63 Route Error (RERR) Y RERR [J-D] Z S E A B H C I G F K J D M N L J sends a route error to S along route J-F-E-S when its attempt to forward the data packet S (with route SEFJD) on J-D fails. Nodes hearing RERR update their route cache to remove link J-D CMPE 257 Winter'11 63

64 Route Caching: Beware! Stale caches can adversely affect performance. With time and host mobility, cached routes may become invalid. A sender host may try several stale routes (obtained from local cache, or replied from cache by other nodes), before finding a good route. CMPE 257 Winter'11 64

65 DSR: Advantages Routes maintained only between nodes who need to communicate. Reduces overhead of route maintenance. Route caching can further reduce route discovery overhead. Single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches. CMPE 257 Winter'11 65

66 DSR: Disadvantages Packet header size grows with route length. Flood of route requests may potentially reach all nodes in the network. Care must be taken to avoid collisions between route requests propagated by neighboring nodes. Insertion of random delays before forwarding RREQ. CMPE 257 Winter'11 66

67 DSR: Disadvantages Increased contention if too many route replies come back due to nodes replying using their local cache. RREP storm problem. Reply storm may be eased by preventing a node from sending RREP if it hears another RREP with a shorter route. CMPE 257 Winter'11 67

68 DSR: Disadvantages An intermediate node may send RREP using a stale cached route, thus polluting other caches. This problem can be eased if some mechanism to purge (potentially) invalid cached routes is incorporated. Static timeouts. Adaptive timeouts based on link stability. CMPE 257 Winter'11 68

69 AODV Route Requests (RREQ) are forwarded similarly to DSR. When a node re-broadcasts a RREQ, it sets up a reverse path pointing towards the source. AODV assumes symmetric (bi-directional) links. When the intended destination receives a RREQ, it replies by sending a RREP. RREPs travel along the reverse path set-up when RREQ is forwarded. CMPE 257 Winter'11 69

70 Route Requests in AODV Y Z S E A B H C I G F K J D M N L Represents a node that has received RREQ for D from S CMPE 257 Winter'11 70

71 Route Requests in AODV Y Broadcast transmission Z S E A B H C I G F K J D M N L Represents transmission of RREQ CMPE 257 Winter'11 71

72 Route Requests in AODV Y Z S E A B H C I G F K J D M N L Represents links on Reverse Path CMPE 257 Winter'11 72

73 AODV Route Discovery: Observations RREQ contains source and destination IP address, current destination seq. number (incremented as a result of loss of prior route), and broadcast id (incremented for every RREQ). Source IP + bcast id uniquely identifies RREQ: nodes do not forward RREQs they have forwarded recently. RREQ processing: node creates reverse route table entry for RREQ source with TTL. If node has unexpired route to destination in its table with sequence number >= RREQ s, it replies to RREQ with Route Reply (RREP) back to source. Otherwise, broadcast RREQ onward. CMPE 257 Winter'11 73

74 Destination Sequence Number When node D receives route request with destination sequence number N, D sets its sequence number to N, unless it is already larger than N. Node s own sequence number is monotonically increasing. Sequence number is incremented after neighborhood topology change. CMPE 257 Winter'11 74

75 Reverse Path Setup in AODV Y Z S E A B H C I G F K J D M N L Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once CMPE 257 Winter'11 75

76 Reverse Path Setup in AODV Y Z S E A B H C I G F K J D M N L CMPE 257 Winter'11 76

77 Reverse Path Setup in AODV Y Z S E A B H C I G F K J D M N L Node D does not forward RREQ, because node D is the intended target of the RREQ CMPE 257 Winter'11 77

78 Route Reply in AODV An intermediate node has current route to destination, responds to RREQ with RREP. RREP contains source and destination IP, current sequence number, number of hops to destination. If destination, then destination seq. #. Else, node s current record of destination s seq. #. Node receiving RREP sets up forward path to destination. If multiple RREPs received, node forwards first one. Later RREPs discarded unless greater seq. # or smaller # of hops. CMPE 257 Winter'11 78

79 Route Reply Example Y Z S E A B H C I G F K J D M N L Represents links on path taken by RREP CMPE 257 Winter'11 79

80 Forward Path Setup in AODV Y Z S E A B H C I G F K J D M N L Forward links are setup when RREP travels along the reverse path Represents a link on the forward path CMPE 257 Winter'11 80

81 Data Delivery in AODV Y DATA Z S E A B H C I G F K J D M N L Routing table entries used to forward data packet. Route is not included in packet header. CMPE 257 Winter'11 81

82 Timeouts A routing table entry maintaining a reverse path is purged after a timeout interval. Timeout should be long enough to allow RREP to come back. Routing table entry maintaining a forward path is purged if not used for active_route_timeout interval. If no data being sent using a particular routing table entry, that entry will be deleted from the routing table (even if the route may actually still be valid). CMPE 257 Winter'11 82

83 Link Failure Reporting Link failures are propagated by means of Route Error messages, which also update destination sequence numbers. RERR lists destinations now unreachable. If upstream node has neighbors as precursors for the affected destinations, it broadcasts RERR. Nodes receiving the RERR update cost to destination to infinity and forward RERR if needed. Upon receiving RERR, source will initiate route discovery if still needs route. CMPE 257 Winter'11 83

84 Route Error When node X is unable to forward packet P (from node S to node D) on link (X,Y), it generates a RERR message. Node X increments the destination sequence number for D cached at node X. The incremented sequence number N is included in the RERR. When node S receives the RERR, it initiates a new route discovery for D using destination sequence number at least as large as N. CMPE 257 Winter'11 84

85 Link Failure Detection Hello messages: neighbor nodes periodically exchange hello messages. Absence of hello message is used as an indication of link failure. Alternatively, failure to receive several MAC-level ACKs may be used as an indication of link failure. CMPE 257 Winter'11 85

86 AODV Packet Header RREQ: RREQ id. Destination IP address. Destination sequence number. Originator IP address. Originator sequence number. RREQ id + originator IP uniquely identifies the RREQ. Originator sequence number. Destination sequence number. CMPE 257 Winter'11 86

87 Destination Sequence Number Avoid using stale routes. Node updates its destination seq. # when: It generates a RREQ. Prevents conflicts previously established reverse routes. It generates a RREP. New-seq-# = max(current seq #, RREQ dest. seq #). CMPE 257 Winter'11 87

88 Sequence Numbers in AODV To prevent formation of loops A B C D E A B C D E Assume that A does not know about failure of link C-D because RERR sent by C is lost Now C performs a route discovery for D. A receives the RREQ (say, via path C-E-A) A will reply since it knows a route to D via B. Results in a loop (for instance, C-E-A-B-C ) CMPE 257 Winter'11 88

89 Optimization: Expanding Ring Search RREQs are initially sent with small Time-to-Live (TTL) field, to limit their propagation. DSR also includes a similar optimization. If no RREP is received, then larger TTL tried. CMPE 257 Winter'11 89

90 Does The Sequence Numbering Work? To some extent: Sequence numbering scheme is not very efficient. Scheme requires that any given node A either never forgets a destination sequence number it learns, or is able to wait long enough so that it cannot possibly attempt to reach a destination D through a path involving a node B that uses A to reach D. CMPE 257 Winter'11 90

91 Summary: AODV Routes not included in packet header. Nodes maintain routing table entries for active routes. At most one route (next hop) maintained at each node. Unused routes expire even if topology does not change. CMPE 257 Winter'11 91

92 Optimized Link State Routing (OLSR) [RFC 3626] Overhead of flooding link state information reduced by having fewer nodes forward the information. Broadcast from X only forwarded by its multipoint relays (MPRs). Overhead is also reduced as the size of the LS updates is reduced: LS updates contain only info on MPRs. CMPE 257 Winter'11 92

93 OLSR OLSR floods information through MPRs. Flooded information contains links connecting nodes to respective MPRs. I.e., node sends info on nodes that selected it as their MPR. Periodic HELLO messages inform nodes which other nodes selected it as their MPR. Routes used by OLSR only include multipoint relays as intermediate nodes. CMPE 257 Winter'11 93

94 MPRs Multipoint relays of node X are its neighbors such that each two-hop neighbor of X is a one-hop neighbor of at least one multipoint relay of X. Each node transmits its neighbor list in periodic beacons, so that all nodes know their 2-hop neighbors. MPRs of X are 1-hop neighbors of X covering X s 2-hop neighbors. CMPE 257 Winter'11 94

95 Optimized Link State Routing (OLSR) C and E are multipoint relays of A. B F J G C A D E H K Node that has broadcast state information from A CMPE 257 Winter'11 95

96 Optimized Link State Routing (OLSR) Nodes C and E forward information received from A. B F J G C A D E H K Node that has broadcast state information from A CMPE 257 Winter'11 96

97 Optimized Link State Routing (OLSR) E and K are multipoint relays for H. K forwards information received from H. E has already forwarded the same information once. B F J G C A D E H K L Node that has broadcast state information from A CMPE 257 Winter'11 97

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile Adhoc Networks and Routing in MANETS (most of the slides borrowed from Prof. Sridhar Iyer) Diwakar Yagyasen 1 Index Mobile Ad Hoc Networks (MANET) MAC in MANET MANET routing

More information

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone Politecnico di Milano Facoltà di Ingegneria dell Informazione WI-7 Ad hoc networks Wireless Internet Prof. Antonio Capone Acknowlegments o This class notes are mostly based on the teaching material of:

More information

Wireless Mul*hop Ad Hoc Networks

Wireless Mul*hop Ad Hoc Networks Wireless Mul*hop Guevara Noubir noubir@ccs.neu.edu Some slides are from Nitin Vaidya s tutorial. Infrastructure vs. Ad Hoc Wireless Networks Infrastructure networks: One or several Access- Points (AP)

More information

Mobile Ad-Hoc Networks & Routing Algorithms

Mobile Ad-Hoc Networks & Routing Algorithms Mobile Ad-Hoc Networks & Routing Algorithms EMMANOUIL G. SPANAKIS, PhD. spanakis@csd.uoc.gr COLLABORATING RESEARCHER, COMPUTATIONAL BIOMEDICINE LABORATORY, FORTH-ICS VISITING LECTURER, COMPUTER SCIENCE

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Mobile Ad Hoc Networks: Routing, MAC and Transport Issues

Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Nitin H. Vaidya University of Illinois at Urbana-Champaign nhv@uiuc.edu http://www.crhc.uiuc.edu/~nhv 2004 Nitin Vaidya 1 Notes Names in brackets,

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

AD HOC NETWORKS. RAJINI M 2 ND SEM M.Tech DECS PESIT

AD HOC NETWORKS. RAJINI M 2 ND SEM M.Tech DECS PESIT AD HOC NETWORKS RAJINI M 2 ND SEM M.Tech DECS PESIT OUTLINE Introduction Features of Ad hoc network Types of ad hoc network MANETs Network architecture MAC protocols Routing protocols Denial of service

More information

Mobile Ad Hoc Networks

Mobile Ad Hoc Networks Mobile Ad Hoc Networks Tutorial at CIT 2000 Bhubaneshwar, Dec 20 23 Sridhar Iyer IIT Bombay http://www.it.iitb.ernet.in.in/~sri sri@it.iitb.ernet.in Acknowledgements Many figures, slides and reference

More information

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks A. Specific properties B. Flooding as a basic mechanism C. Basic routing protocols DSR AODV y DYMO OLSR y OLSRv2 D. Advanced protocols and techniques Acknowledgments

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Lecture 4: Mobile Ad Hoc and Sensor Networks (I)

Lecture 4: Mobile Ad Hoc and Sensor Networks (I) Lecture 4: Mobile Ad Hoc and Sensor Networks (I) Ing-Ray Chen CS 6204 Mobile Computing Virginia Tech Courtesy of G.G. Richard III for providing some of the slides Mobile Ad Hoc Networks May need to traverse

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Chapter 7. Wireless Ad Hoc Networks. 7: Wireless Ad Hoc Networks 7-1

Chapter 7. Wireless Ad Hoc Networks. 7: Wireless Ad Hoc Networks 7-1 Chapter 7 Wireless Ad Hoc Networks 7: Wireless Ad Hoc Networks 7-1 What is an Ad Hoc Network? Definitions: An ad-hoc network is one that comes together as needed, not necessarily with any assistance from

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5 ynamic Source Routing (SR) [Johnson96] S 6811 : Lecture 5 d Hoc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation Loop freedom

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Link Layer II: MACA and MACAW

Link Layer II: MACA and MACAW Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet

More information

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay)  Wireless MAC Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Wireless MAC 2 1 Wireless MAC CSMA as wireless MAC? Hidden and exposed terminal problems make

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Wireless & Mobile Networking

Wireless & Mobile Networking Wireless & Mobile Networking CS 752/852 - Spring 2011 Lec #3: Medium Access Control - I Tamer Nadeem Dept. of Computer Science Data Link Layer (DLL) Main Task of the data link layer: Provide error-free

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8] 192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras Network

Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras Network www.ijcsi.org 7 Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras Network L. A. Hassnawi 1, R.B Ahmad 2, Abid Yahya 3, S. A. Aljunid 4, M. Elshaikh 5 School of

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV Wireless networks 1 Overview Wireless networks basics IEEE 802.11 (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV 2 Wireless Networks Autonomous systems of mobile hosts connected by wireless

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0 White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information