Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Similar documents
CMPE 257: Wireless and Mobile Networking

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CMPE 257: Wireless and Mobile Networking

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Communications

ECE 4450:427/527 - Computer Networks Spring 2017

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Local Area Networks NETW 901

Wireless and Mobile Networks 7-2

Wireless Local Area Network (IEEE )

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Mobile and Sensor Systems

Wireless Local Area Networks (WLANs) Part I

MSIT 413: Wireless Technologies Week 8

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Wireless LAN -Architecture

Wireless LAN. Access Point. Provides network connectivity over wireless media

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Chapter 4. The Medium Access Control Sublayer

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

CSC 4900 Computer Networks: Wireless Networks

The Medium Access Control Sublayer

Chapter 6 Wireless and Mobile Networks

CSE 461: Wireless Networks

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Multiple Access Links and Protocols

Wireless Communication and Networking CMPT 371

Wireless and Mobile Networks

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Computer Networks. Wireless LANs

Guide to Wireless Communications, Third Edition. Objectives

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Mohamed Khedr.

MULTIPLE ACCESS PROTOCOLS 2. 1

Data and Computer Communications. Chapter 13 Wireless LANs

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Data Link Layer: Collisions

Lesson 2-3: The IEEE x MAC Layer

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Wireless LANs. ITS 413 Internet Technologies and Applications

COMP 3331/9331: Computer Networks and Applications

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

CS263: Wireless Communications and Sensor Networks

15-441: Computer Networking. Wireless Networking

Unit 7 Media Access Control (MAC)

Chapter 12 Multiple Access 12.1

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Link Layer Technologies

Wireless Communication and Networking CMPT 371

Mobile Communications Chapter 7: Wireless LANs

Data Link Layer -2- Network Access

Advanced Computer Networks WLAN

Wireless Protocols. Training materials for wireless trainers

Chapter 10: Wireless LAN & VLANs

Wireless# Guide to Wireless Communications. Objectives

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Medium Access Control

Last Lecture: Data Link Layer

Mobile & Wireless Networking. Lecture 7: Wireless LAN

3.1. Introduction to WLAN IEEE

Lecture 16: QoS and "

Mohammad Hossein Manshaei 1393

Outline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao

EEC-484/584 Computer Networks

Multiple Access in Cellular and Systems

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 332 Computer Networks Wireless Networks

Wireless Local Area Networks (WLAN)

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals

Wireless networks. Wireless Network Taxonomy

Data Communications. Data Link Layer Protocols Wireless LANs

Data Link Layer -2- Network Access

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Introduction to IEEE

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Lecture 17: Wireless Networking"

Medium Access Control Sublayer Chapter 4

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

M06:Wireless and Mobile Networks. Corinna Schmitt

Wireless Sensor Networks

Transcription:

Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3 1

Covered by IEEE 802.11 802.11 variations Original 802.11 (1997) Wireless LAN 1-2Mbps 900 MHz or 2.4 GHz 802.11a (1999) 54Mbps in 5GHz range 802.11b (Wi-Fi) (1999) 11Mbps in 2.4GHz range 802.11g (2003) 54Mbps in 2.4GHz range 802.11n (2009) multiple-input multiple-output antennas (MIMO), 54Mbit/s to 600Mbit/s. 2

IEEE 802.11 Architectures Basic Service Set (BSS) Stationary or mobile wireless s An optional access point (AP) Configurations ad-hoc architecture: without an AP, can not send data to other BBSs (WiFi-Direct) Infrastructure: with an AP (most commonly used) laptop laptop AP Ad hoc Infrastructure 3

IEEE 802.11 Physical Layer Spread spectrum: spreads the signal s spectral energy over a wide range of frequencies (i.e., larger bandwidth) Less prone to interference More secure as a intruder trying to listen at a particular frequency gets only a small part of the signal. Two spread spectrum technologies Frequency-hopping spread spectrum (FHSS) Direct-sequence spread spectrum (DSSS) 4

FHSS Developed in the early 1940s Operate on a set of frequencies that all lie in the broadcast range Transmit using one frequency for a fixed period of time and then switches to the next frequency Using a pseudo-random number generator to generate the frequency sequence so that both the transmitter and the receiver have the same sequence 5

DSSS DSSS expands a single data bit into n bits The transmitter starts with a string of data bits For each bit, generate a pseudorandom bit string, called a chipping sequence, containing n bits. Combine each data bit and the chipping sequence to create a chip code and transmit the chip code. 1Mbps data rate 4Mbps transmission rate 6

Hidden Station Problem Different s may have different transmission range. Range of B Range of C laptop B laptop A Solution: handshaking RTS/CTS laptop C AP Request To Send (RTS)/Clear To Send (CTS) B A C laptop AP laptop A laptop RTS laptop laptop laptop laptop Distribution2System CTS Distribution2System AP CTS Server Distribution2SystemAP Server Server 7

Exposed Station Problem The reverse of the hidden problem Range of A Range of B Range of C laptop B laptop A laptop C laptop D laptop laptop laptop Handshaking can not help B A C AP AP D AP AP laptop RTS laptop RTS laptop laptop laptop laptop laptop statio Data CTS AP AP Distribution2System Distribution2System Distribution2System Distribution2System Server Server Data Server Server RTS RTS CTS AP Server statio Se Se 8

IEEE 802.11 MAC Sublayer Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Why cannot Wireless LANs use CSMA/CD? To detect collision, a must be able to transmit and listen at the same time. Collision may not be detected because of the hidden problem The distance between s can be large. Signal fading could prevent a at one end from detecting a collision at the other end. 9

CSMA/CA Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Try to avoid collisions instead of detecting collisions. Collisions can still occur. Use the binary exponential backoff algorithm. Three strategies to reduce collisions Interframe space Contention window Acknowledgment 10

CSMA/CA (cont.) Continuously sense Found idle IFS Binary exponential busy Contention window Send frame Time-out Time Interframe Space (IFS) A period of time waited after an idle channel is found Another may have already started transmitting, but the signal has not reach this destination. Prioritize s or frame types, e.g., a that is assigned a shorter IFS has a higher priority. 11

CSMA/CA (cont.) Contention window An amount of time divided into slots A that is ready to send choose a random number of slots as its wait time. Binary exponential back-off: double the window size each time the cannot detect an idle channel after the IFS time. Acknowledgement Frame may still get collided. Guarantee the receiver has received the frame 12

CSMA/CA (cont.) Wait for frame to transmit Medium No idle? Yes Wait IFS Still No idle? Yes Transmit frame Wait until current transmission ends Wait IFS Still idle? Yes Exponential backoff while medium idle No Transmit frame 13

Bluetooth A technology in which a microchip containing a radio transceiver is embedded in electronic devices and allows the devices to communicate without wires or cables Communication between wireless mouse or keyboard with the computer Share information between different mobile phones Bluetooth LAN An ad hoc network that formed spontaneously by Bluetooth devices Wireless Personal-area Network (PAN) IEEE 802.15 14

Piconets (small net) Bluetooth Architecture Up to eight s One called primary, the rest called secondaries 15

Scatternet Bluetooth Architecture (cont.) Consist of two or more piconets. A secondary in one piconet can be the primary in another piconet 16

Bluetooth Radio Layer Roughly equivalent to the physical layer in the Internet model Low power and transmission range of 10m FHSS Hops 1600 times per second, Uses each frequency for only 625 µs (1/1600 s) 17

Bluetooth Baseband Layer Roughly equivalent to the MAC layer in LANs TDD-TDMA (time-division duplex TDMA) Half-duplex communication Time slot is 625 µs Single-secondary communication Primary uses even-numbered slots (0, 2, 4, ) Secondary uses odd-numbered slots (1, 3, 5, ) Primary 625µs 366µs Hop Hop Secondary Hop f 0 f 1 f 2 f 3 Hop 18

Bluetooth Baseband Layer (cont.) Multiple-secondary communication Primary uses even-numbered slots (0, 2, 4, ) A secondary sends in the next odd-numbered slot if the packet in the previous slot was addressed to it. Primary 625µs 366µs Hop Hop Secondary 1 Hop Secondary 2 f 0 f 1 f 2 f 3 Hop 19

IEEE 802.11 Summary FHSS DSSS Hidden/Exposed Station Problem CSMA/CA Bluetooth 20