Multiple Access Links and Protocols
|
|
- Scarlett Andrews
- 6 years ago
- Views:
Transcription
1 Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet upstream HFC wireless LAN shared wire (e.g., cabled Ethernet) shared RF (e.g., WiFi) shared RF (satellite) humans at a cocktail party (shared air, acoustical) 1
2 Multiple Access protocols single shared broadcast channel two or more simultaneous transmissions by nodes: interference collision if node receives two or more signals at the same time multiple access protocol distributed algorithm that determines how nodes share channel, i.e., determine when node can transmit communication about channel sharing must use channel itself! no out-of-band channel for coordination 2
3 Ideal Multiple Access Protocol Broadcast channel of rate R bps 1. when one node wants to transmit, it can send at rate R. 2. when M nodes want to transmit, each can send at average rate R/M 3. fully decentralized: no special node to coordinate transmissions no synchronization of clocks, slots 4. simple 3
4 MAC Protocols: a taxonomy Three broad classes: Channel Partitioning divide channel into smaller pieces (time slots, frequency, code) allocate piece to node for exclusive use Random Access channel not divided, allow collisions recover from collisions Taking turns nodes take turns, but nodes with more to send can take longer turns 4
5 Channel Partitioning MAC protocols: TDMA TDMA: time division multiple access access to channel in "rounds" each station gets fixed length slot (length = pkt trans time) in each round unused slots go idle Example 6-station LAN: 1,3,4 have pkt, slots 2,5,6 idle 6-slot frame
6 frequency bands Channel Partitioning MAC protocols: FDMA FDMA: frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go idle Example 6-station LAN: 1,3,4 have pkt, frequency bands 2,5,6 idle 6
7 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes collision, random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) Examples of random access MAC protocols: slotted ALOHA ALOHA CSMA, CSMA/CD, CSMA/CA 7
8 Slotted ALOHA Assumptions: all frames same size time divided into equal size slots (time to transmit 1 frame) nodes start to transmit only slot beginning nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision Operation: when node obtains fresh frame, transmits in next slot if no collision: node can send new frame in next slot if collision: node retransmits frame in each subsequent slot with prob. p until success 8
9 Slotted ALOHA Pros single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet clock synchronization 9
10 Slotted Aloha efficiency Efficiency : long-run fraction of successful slots (many nodes, all with many frames to send) suppose: N nodes with many frames to send, each transmits in slot with probability p prob that given node has success in a slot = p(1-p) N-1 prob that any node has a success = Np(1-p) N-1 max efficiency: find p* that maximizes Np(1-p) N-1 for many nodes, take limit of Np*(1-p*) N-1 as N goes to infinity, gives: Max efficiency = 1/e =.37 At best: channel used for useful transmissions 37% of time!! 10
11 Pure (unslotted) ALOHA unslotted Aloha: simpler, no synchronization when frame first arrives transmit immediately collision probability increases: frame sent at t 0 collides with other frames sent in [t 0-1,t 0 +1] 11
12 Pure Aloha efficiency P(success by given node) = P(node transmits). P(no other node transmits in [t 0-1,t 0 ]. P(no other node transmits in [t 0,t 0 +1] = p. (1-p) N-1. (1-p) N-1 = p. (1-p) 2(N-1) choosing optimum p and then letting n -> infinity... = 1/(2e) =.18 even worse than slotted Aloha! 12
13 13
14 Now, let s improve things 14
15 IEEE : multiple access avoid collisions: 2 + nodes transmitting at same time : CSMA - sense before transmitting don t collide with ongoing transmission by other node : no collision detection! difficult to receive (sense collisions) when transmitting due to weak received signals (fading) can t sense all collisions in any case: hidden terminal, fading goal: avoid collisions: CSMA/C(ollision)A(voidance) C A B C A B A s signal strength C s signal strength space 15
16 IEEE MAC Protocol: CSMA/CA sender 1 if sense channel idle for DIFS then transmit entire frame (no CD) 2 if sense channel busy then start random backoff time timer counts down while channel idle transmit when timer expires 3 if no ACK then increase random backoff interval, repeat step receiver - if frame received OK return ACK after SIFS (service model is connectionless, acked) DIFS sender data ACK receiver SIFS 16
17 IEEE MAC: Distributed Coordination Function (DCF) Make use of CSMA (carrier sense multiple access) Use set of delays generic called Interframe Space (IFS) Algorithm Logic: 1. Station sense the medium 2. If medium idle, wait IFS, then if still idle transmit frame 3. If medium busy or become busy, defer and monitor the medium until idle 4. Then, delay IFS and sense medium 5. If medium idle, exponential backoff and if then idle, station transmit Binary exponential backoff -> handle heavy load 17
18 IEEE MAC: Distributed Coordination Function (DCF) Make use of CSMA (carrier sense multiple access) Use set of delays generic called Interframe Space (IFS) Algorithm Logic: 1. Station sense the medium 2. If medium idle, wait IFS, then if still idle transmit frame 3. If medium busy or become busy, defer and monitor the medium until idle 4. Then, delay IFS and sense medium 5. If medium idle, exponential backoff and if then idle, station transmit Binary exponential backoff -> handle heavy load 18
19 IEEE MAC: DCF, cont d Priority-based scheme - use 3 values for IFS: SIFS (short IFS): shortest IFS used for immediate responses such as ACK, CTS, poll response PIFS (point coordination function IFS): middle length IFS used for issuing polls by a centralized controller DIFS (distributed coordination function IFS): longest IFS used for regular asynchronous frames 19
20 Hidden Terminal Problem Hidden terminal problem (ad-hoc and WLAN) A B C A s signal strength C s signal strength space C A B 20
21 Hidden Terminal Problem Hidden terminal problem (ad-hoc and WLAN) A B C A s signal strength C s signal strength space C A B 21
22 Hidden Terminal Problem Hidden terminal problem (ad-hoc and WLAN) - medium free near the transmitter - medium not free near the receiver => Packet collision A B C A s signal strength C s signal strength space C A B 22
23 Hidden Terminal Problem Hidden terminal problem (ad-hoc and WLAN) - medium free near the transmitter - medium not free near the receiver => Packet collision Possible solution: - MAC scheme using RTS-CTS scheme A B C A s signal strength space C s signal strength C A B 23
24 Avoiding collisions (more) idea: allow sender to reserve channel rather than random access of data frames: avoid collisions of long data frames sender first transmits small request-to-send (RTS) packets to base station using CSMA RTS may still collide with each other (but they re short) BS broadcasts clear-to-send CTS to host in response to RTS RTS heard by all nodes because of broadcast property sender transmits (large) data frame other stations defer transmissions until it is done Avoid data frame collisions completely using small reservation packets! 24
25 Collision Avoidance: RTS-CTS exchange A AP B reservation collision DATA (A) defer time 25
26 Hidden Terminal Problem [2] Problems with RTS-CTS solution: - possible collisions between CTS and RTS - collisions between data packets due to multiple different CTS granted to different neighboring nodes - Also, adds delay and overhead 26
27 Exposed Terminal Problems Exposed terminal problem (ad-hoc and WLAN) - medium free near the receiver - medium busy near the transmitter => Waist of bandwidth Possible solutions: - directional antennas - separate channels for control and data 27
28 Issues, medium access schemes Distributed operation Synchronization Hidden terminals Exposed terminals Throughput Access delay Fairness Real-time traffic support Resource reservation Ability to measure resource availability Capability for power control Adaptive rate control Use of directional antennas 28
29 Issues, medium access schemes Distributed operation Synchronization Hidden terminals Exposed terminals Throughput Access delay Fairness Real-time traffic support Resource reservation Ability to measure resource availability Capability for power control Adaptive rate control Use of directional antennas 29
30 Issues, medium access schemes Distributed operation Synchronization Hidden terminals Exposed terminals Throughput Access delay Fairness Real-time traffic support Resource reservation Ability to measure resource availability Capability for power control Adaptive rate control Use of directional antennas 30
31 31
32 frame: addressing frame control duration address 1 address 2 address 3 seq control address 4 payload CRC Address 1: MAC address of wireless host or AP to receive this frame Address 2: MAC address of wireless host or AP transmitting this frame Address 3: MAC address of router interface to which AP is attached Address 4: used only in ad hoc mode 32
33 frame: addressing H1 R1 router Internet AP R1 MAC addr H1 MAC addr dest. address source address frame AP MAC addr H1 MAC addr R1 MAC addr address 1 address 2 address frame 33
34 frame: more duration of reserved transmission time (RTS/CTS) frame seq # (for reliable ARQ) frame control duration address 1 address 2 address 3 seq control address 4 payload CRC Protocol version Type Subtype To AP From AP More frag Retry Power mgt More data WEP Rsvd frame type (RTS, CTS, ACK, data) 34
35 35
36 A few more about QoS 36
37 IEEE MAC: Point Coordination Function (PCF) Alternative access method on top of DCF Polling operation by a centralized master Use PIFS when issuing polls For avoiding locking out the asynchronous traffic the superframe is used 37
38 IEEE MAC protocol 38
39 IEEE MAC Frame Types Six types of control frames Power save - poll (PS-poll) Request to send (RTS) Clear to send (CTS) Acknowledgment (ACK) Contention-free (CF)-end CF-end + CF-Ack Eight types of data frames Carry user data Data Data + CF-Ack Data + CF-poll Data + CF-Ack + CF-poll Do not carry user data Null Function CF-Ack CF-Poll CF-Ack + CF-Poll Management frames association request and association response reassociation request and reassociation response probe request and probe response beacon announcement traffic indication message disassociation authentication and deauthentication 39
40 IEEE e: Enhanced Distribution Coordination Function (EDCF) 40
41 IEEE MAC protocol: parameters 41
42 42
43 Two Popular 2.4 GHz Standards: IEEE (WiFi) Fast (11 Mbps) High power Long range Single-purpose Typically channel 1, 6, or 11 Ethernet replacement Easily available Bluetooth Slow (1 Mbps) Low power Short range Flexible Frequency hopping Cable replacement (e.g., device-to-device) 43
44 Example What technology/device? 44
45 Example Figures from: A. Mahanti et al., Ambient Interference Effects in Wi-Fi Networks, Proc. IFIP Networking, Many devices and technologies sharing the medium resulting in different degrees of interference 45
46 Example: Channel Utilization Channel utilization: The % of time a transmission is present from a known RF source, in a given channel Channels 1 and 6, utilization peaked near 60%, while for channel 11 it was over 90%. Channel 11 spikes caused due to microwave ovens, cordless phones, and other fixed-frequency devices. Figure from: A. Mahanti et al., Ambient Interference Effects in Wi-Fi Networks, Proc. IFIP Networking,
47 47
48 Background: Cellular network technology Overview 1G: Analog voice (no global standard ) 2G: Digital voice (again GSM vs. CDMA) 3G: Digital voice and data Again... UMTS (WCDMA) vs. CDMA2000 (both CDMA-based) and 2.5G: EDGE (GSM-based) 4G: LTE, LTE-Advanced Trends OFDM (OFDMA for downlink and SC-OFDM for uplink) More data, packet-based switching, shared channel, directional (spatial reuse), multi-antenna, etc. Other goals: Seamless with other technologies, QoS for multimedia, etc. 48
49 Components of cellular network architecture cell covers geographical region base station (BS) analogous to AP mobile users attach to network through BS air-interface: physical and link layer protocol between mobile and BS MSC connects cells to wired tel. net. manages call setup (more later!) handles mobility (more later!) Mobile Switching Center Mobile Switching Center Public telephone network wired network Wireless, Mobile Networks 6-49
50 Cellular networks: the first hop Techniques for sharing mobile-to-bs radio spectrum combined FDMA/TDMA: divide spectrum in frequency channels, divide each channel into time slots CDMA: code division multiple access SDMA: space division multiple access frequency bands time slots 50
51 2G (voice) network architecture Base station system (BSS) BTS BSC MSC G Gateway MSC Public telephone network Legend Base transceiver station (BTS) Base station controller (BSC) Mobile Switching Center (MSC) Mobile subscribers Wireless, Mobile Networks 6-51
52 3G (voice+data) network architecture radio network controller MSC G Gateway MSC Public telephone network Key insight: new cellular data network operates in parallel (except at edge) with existing cellular voice network voice network unchanged in core data network operates in parallel SGSN G GGSN Public Internet Serving GPRS Support Node (SGSN) Gateway GPRS Support Node (GGSN) Wireless, Mobile Networks 6-52
53 3G (voice+data) network architecture radio network controller MSC G Gateway MSC Public telephone network SGSN G Public Internet GGSN radio interface (WCDMA, HSPA) radio access network Universal Terrestrial Radio Access Network (UTRAN) core network General Packet Radio Service (GPRS) Core Network public Internet Wireless, Mobile Networks 6-53
54 Code Division Multiple Access (CDMA) used in several wireless broadcast channels (cellular, satellite, etc) standards unique code assigned to each user; i.e., code set partitioning all users share same frequency, but each user has own chipping sequence (i.e., code) to encode data encoded signal = (original data) X (chipping sequence) decoding: inner-product of encoded signal and chipping sequence allows multiple users to coexist and transmit simultaneously with minimal interference (if codes are orthogonal ) 54
55 CDMA Encode/Decode sender data bits code d 0 = 1 d 1 = slot 1 slot 0 Z i,m = d i. cm channel output Z i,m slot 1 channel output slot 0 channel output received input receiver code slot 1 slot 0 M D i = S Z. i,m cm m=1 M d 1 = -1 slot 1 channel output d 0 = 1 slot 0 channel output 55
56 CDMA: two-sender interference 56
57 Practical chipping codes Orthogonal even under offset? No synchronization Random sequence; high probability low cross-correlation Different chip lengths? different rates, take advantage of silence, more calls 57
58 LTE and LTE-Advanced ITU, IMT-advanced, 3GPP, and LTE-Advavnced... All traffic is IP-based Base station called enhanced NodeB, enodeb or enb Downlink (OFDMA) vs uplink (SC-OFDM) 58
59 LTE downlink (OFDMA-based) Figure from: 3GPP TR ; Feasibility Study for Orthogonal Frequency Division Multiplexing (OFDM) for UTRAN enhancement (Release 6) Data symbols are independently modulated and transmitted over a high number of closely spaced orthogonal subcarriers. Availible modulation schemes for E-UTRA downlink: QPSK, 16QAM, and 64QAM OFDM signal is generated using Inverse Fast Fourier Transform (IFFT) digital signal processingƒ 59
60 Figure from: S. Parkvall, LTE The Global Standard for Mobile Broadband, presentation, Ericsson Research Time domain structure: 10 ms frame consisting of 10 subframes of length 1 ms Each subframe consists of 2 slots of length 0.5 ms Each slot consists of 7 OFDM symbols (6 symbols in case of extended CP) ƒresource element (RE) One subcarier during one OFDM symbol ƒresource block (RB) 12 subcarriers during one slot (180 khz 0.5 ms) 60
61 Scheduling decisions done in the base station Scheduling algorithm is a vendor-specific, but typically takes into account Radio link quality situation of different users Overall interference situation Quality of Service requirements Service priorities, etc. 61
62 Downlink vs uplink Parallel transmission on large number of narrowband subcarriers Avoids own-cell interference Robust to time dispersion ƒbad power-amplifier efficiency Single carrier properties Better battery lifetime at phones/sender (reduced power-amplifier power) More complexity at receiver (equalizer needed) Lower throughput 62
63 Current LTE status GSA Fast Facts based on their "Evolution to LTE Report" (updated September 2014): 526 operators are investing in LTE in 156 countries Over 21% of operators are deploying LTE-Advanced technologies. 16 operators have commercially launched LTE-Advanced systems. 66 operators in 35 countries are investing in VoLTE studies, trials, deployments 10 operators have commercially launched HD voice service using VoLTE GSA forecasts there will be at least 350 commercially launched LTE networks by end 2014 More material later... (e.g., embms and MIMO) 63
Multiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30
EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access
More informationData Link Layer: Multi Access Protocols
Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationChapter 5: Link layer
Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationCS 332 Computer Networks Wireless Networks
CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationPhysical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan
P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Reading Guide: Chapter 6: 6.1 6.4 1 Ch. 6: Wireless and Mobile Networks Background: v # wireless (mobile) phone subscribers now exceeds # wired
More informationLecture 19. Principles behind data link layer services Framing Multiple access protocols
Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationCSC 4900 Computer Networks: The Link Layer
CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationModule 6: Wireless Mobile Networks
Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationCC451 Computer Networks
CC451 Computer Networks Lecture 9 Link Layer 5: DataLink Layer 5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students,
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationLink Layer and LANs. CMPS 4750/6750: Computer Networks
Link Layer and LANs CMPS 4750/6750: Computer Networks 1 Outline overview (6.1) multiple access (6.3) link addressing: ARP (6.4.1) a day in the life of a web request (6.7) 2 Link layer: introduction terminology:
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationMedium Access Control
Medium Access Control All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1 Link Layer Introduction and services Multiple access protocols Ethernet Wireless
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling
More informationChapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 5 Link Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can
More informationCSCI-1680 Wireless Chen Avin
CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks
More informationLecture 8 Link Layer: functionality, error detection, media access algorithm
Lecture 8 Link Layer: functionality, error detection, media access algorithm From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.
Chapter 6 Wireless and obile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Chapter 6: Wireless and obile Networks
More informationBroadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses
roadcast Links, ddressing and Media ccess Control Message M C Message M Link Layer In a broadcast, there are two additional issues that must be resolved How do the nodes agree on who gets to use the next?
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationMobile devices for wireless
Mobile devices for wireless Wireless sensors Limited proc. power Small battery Laptop functionally eq. to desktop standard applications TDTS04/09 Föreläsning 0/6: WLAN och TCP i trådlösa nät RFID tag A
More informationCPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts
1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationSC250 Computer Networking I. Link Layer. Prof. Matthias Grossglauser LCA/I&C.
SC250 Computer Networking I Link Layer Prof. Matthias Grossglauser LCA/I&C http://lcawww.epfl.ch 1 Objectives Understand principles behind data link layer services: sharing a broadcast channel: multiple
More informationM06:Wireless and Mobile Networks. Corinna Schmitt
M06:Wireless and Mobile Networks Corinna Schmitt corinna.schmitt@unibas.ch Acknowledgement 2016 M06 2 Background q # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)!
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network
Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationCSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58
CSE 461: Multiple Access Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 Next Topic Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationLink layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 802.11 History and Standardization 802.11 Architectures and Layers 802.11 Frame Format and Addressing 802.11 Mac Layer (CSMA/CA) 2 Wifi 3 twisted pair
More informationComputer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48
Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationChapter V: Link Layer
Chapter V: Link Layer UG3 Computer Communications & Networks (COMN) Myungjin Lee myungjin.lee@ed.ac.uk Slides copyright of Kurose and Ross Link layer services framing, link access: encapsulate datagram
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More informationChapter 6 Wireless and Mobile Networks (Wireless and Mobility)
CSF645 Mobile Computing 行動計算 Chapter 6 Wireless and Mobile Networks (Wireless and Mobility) Computer Networking: A Top Down Approach 6 th edition, Jim Kurose, Keith Ross 吳俊興國立高雄大學資訊工程學系 outline 6.1 Introduction
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationLecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,
More informationWireless and Mobile Networks
Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals # wireline Internet-connected
More informationCSC 8560 Computer Networks: Wireless and Mobility
CSC 8560 Computer Networks: Wireless and Mobility Professor Henry Carter Fall 2017 Chapter 7: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers!
More informationFunctions of physical layer:
Chapter 14 Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium Functions
More informationExtending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.
Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationAdvanced Computer Networks. WLAN, Cellular Networks
Advanced Computer Networks 263 3501 00 WLAN, Cellular Networks Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last week Medium Access COPE Today Last week Short
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationHome Area Networks. Outline
Home Area Networks CS 687 University of Kentucky Fall 2015 Acknowledgment: Some slides are adapted from the slides distributed with the book Computer Networking: A Top Down Approach, 5th edition. Jim Kurose,
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationIEEE MAC Sublayer (Based on IEEE )
IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs A note on the use of these ppt slides: All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 4 th edition.
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More information