G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

Similar documents
Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Data Link Layer Technologies

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 12 Multiple Access 12.1

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Mobile Communications Chapter 3 : Media Access

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

MULTIPLE ACCESS PROTOCOLS 2. 1

ECE 4450:427/527 - Computer Networks Spring 2017

Data Link Layer: Collisions

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Multiple-access protocols

Aloha and slotted aloha

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Multiple Access Links and Protocols

CMPE 257: Wireless and Mobile Networking

Wireless networks. Wireless Network Taxonomy

Wireless Media Access Control

Data Link Layer: Multi Access Protocols

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Multiple Access in Cellular and Systems

CSC 4900 Computer Networks: Wireless Networks

Wireless LAN. Access Point. Provides network connectivity over wireless media

Wireless Local Area Networks. Networks: Wireless LANs 1

Chapter 6 Medium Access Control Protocols and Local Area Networks

Physical Layer: Multiplexing, Spectrum Spreading and Switching. Covers Chapters# 06 & 08 from Text Book

Data Link Layer: Overview, operations

Unit 7 Media Access Control (MAC)

Wireless Communications

Chapter 3 MEDIA ACCESS CONTROL

Strengthening Unlicensed Band Wireless Backhaul

Random Assignment Protocols

CMPE 257: Wireless and Mobile Networking

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Rahman 1. Application

Bikash Sadhukhan. M.Tech(CSE) Lecturer. Dept of CSE/IT Techno India College of Technology

MSIT 413: Wireless Technologies Week 8

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

COS 140: Foundations of Computer Science

Medium Access Control

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

B.E. ELECTRONICS & COMMUNICATION ENGINEERING SEMESTER - VII EC WIRELESS COMMUNICATION

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

CSC 4900 Computer Networks: The Link Layer

ECE 4450:427/527 - Computer Networks Spring 2017

The MAC layer in wireless networks

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

CS 455/555 Intro to Networks and Communications. Link Layer

EE 122: Ethernet and

Mobile and Sensor Systems

Wireless Networking: An Introduction. Hongwei Zhang

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

MAC LAYER. Murat Demirbas SUNY Buffalo

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless and Mobile Networks 7-2

Data Link Layer -2- Network Access

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Chapter 6 Wireless and Mobile Networks

Chapter 5: Link layer

Chapter 5 Link Layer and LANs

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Logical Link Control (LLC) Medium Access Control (MAC)

Goals of Today s Lecture. Adaptors Communicating

CS 332 Computer Networks Wireless Networks

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Chapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CSE 461 Multiple Access. David Wetherall

The Link Layer and LANs. Chapter 6: Link layer and LANs

Multiple Access Protocols

Data Link Layer -2- Network Access

Media Access Control in Ad Hoc Networks

Multiple Access Links and Protocols

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Local Area Networks NETW 901

Last Lecture: Data Link Layer

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

Links. CS125 - mylinks 1 1/22/14

Wireless Communication

Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007)

A DYNAMIC RANDOM CHANNEL RESERVATION FOR MAC PROTOCOLS IN MULTIMEDIA WIRELESS NETWORKS

Multiple Access Technique. Media Access Control (Intro.) Outline. Multiple Access Technique. Designing Issues of MAC protocols. Protocols examples

COMP/ELEC 429/556 Introduction to Computer Networks

CSE 6811 Ashikur Rahman

COMPUTER NETWORK Model Test Paper

COS 140: Foundations of Computer Science

The MAC layer in wireless networks

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

EC Wireless Networks VIII - Semester Questions Bank

Transcription:

G 364: Mobile and Wireless Networking CLASS 2, Wed. Jan 7 2004 Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

Wireless Issues Architecture, communication model and duplexing define the framework where wireless MAC (wmac) protocols are defined wmac protocol design must also take into accounts the unique characteristics of the wireless medium 1/7/2004 2

Boundaries and Interference Due to physical layer problems No definite boundaries for radio waves higher Bit Error Rate (BER) Asymmetric channel qualities Concept of neighbors: nodes within each other transmission range. Only neighbors detect the carrier on the channel Attenuation of signal strength depends on node distance 1/7/2004 3

Hidden Terminal Problem A hidden node is a node in the range of the receiver and not in the range of the transmitter Node C is hidden to node A: Collisions limit the channel efficiency TX RX A B C 1/7/2004 4

Exposed Terminal Problem An exposed node is in the range of the transmitter and not in the range of the receiver Node C is exposed to node A: C can be denied access till A is done bandwidth is under-utilized TX RX C A B 1/7/2004 5

Propagation Delay et Al. Time needed for the transmitted packet to reach the receiver Affect carrier sensing-based protocols Affect slot size Additional overhead Half duplexing: A node can either be in TX or in RX mode at a time Collision detection is more involved Hardware switching time becomes significant 1/7/2004 6

Fundamental MAC Protocols Universal, basic techniques Used by most wmac protocols Derived from wired MAC protocols or specific for the wireless domain Common goal: Multiple Access (MA) FDMA TDMA CDMA Aloha protocols 1/7/2004 7

Frequency Division MA (FDMA) The available bandwidth is divided into M sub-channels (separated by guard bands) 1/7/2004 8

FDMA: Capacity C = capacity (bit per second) of the available bandwidth C/M = capacity of each sub-channel Each TXing node is assigned one or more of the frequencies Each RXing node must listen in the proper frequence 1/7/2004 9

FDMA, Pros and Cons Pros Simultaneous packet TX can occur without collision Less overhead (no switching, no synch) Cons: Increased TX time Longer packet delay L-bits long packet takes M * L / C seconds M times longer than if we had the whole bandwidth 1/7/2004 10

Time Division MA (TDMA) The available bandwidth is divided into M equal time slots organized into a synchronous frame 1/7/2004 11

TDMA: Capacity Each node is assigned one time slot for its exclusive use (either TX or RX) Transmission is non-continuous (buffer-andburst) In that time slot it has the whole bandwidth L-bits long packet takes L / C seconds Long delays: Consecutive packets are separated M-1 slots (basic TDMA) 1/7/2004 12

Code Division MA (CDMA), 1 More than one TX in the same frequency at the same time No interferences Special coding technique: Orthogonal codes Information retrieved from combined signal 1/7/2004 13

CDMA, 2 Information bits are spread across a broadened channel Less susceptible to fading Require more sophisticated hardware Problem: How is the channel broadened? Spread spectrum modulation techniques 1/7/2004 14

Spread spectrum modulation techniques for CDMA, 1 Direct Sequence Spread Spectrum (DSSS) Original message is multiplied by a pseudonoise sequence Increase the amount of bandwidth occupied (spreading factor) SF is used at the receiving node to raise the signal from the interference 1/7/2004 15

Spread spectrum modulation techniques for CDMA, 2 Frequency Hopping Spread Spectrum (FHSS) The TX frequency is shifted according to a specific hopping sequence Aim is interference reduction: Short time in each frequency (dwelling time) Example: Bluetooth 1/7/2004 16

MA Techniques in Communication Systems Advanced Mobile Phone System (AMPS) FDMA/FDD Global System for Mobile (GSM) TDMA/FDD US Digital Cellular (USDC) TDMA/FDD Pacific Digital Cellular (PDC) TDMA/FDD CT2 (Cordless Telephone) FDMA/TDD Digital Euro. Cordless Telephone (DECT) FDMA/TDD US Narrowband Spread Spect. (IS-95) CDMA/FDD W-CDMA (3GPP) CDMA/FDD and /TDD Cdma2000 (3GPP2) CDMA/FDD and /TDD 1/7/2004 17

Aloha Protocols (AlohaNet, Hawaii, Abramson) Brute force MA Lack of channel access A node transmit a packet when it has it Packet delivery needs feedback mechanism (like ARQ=Automatic Repeat Request) If the packet gets lost, it is retransmitted Poor channel utilization 1/7/2004 18

Slotted Aloha Packets are transmitted when needed, at the beginning of a slot Reduces the time a packet is vulnerable to collision Variant: p-persistent slotted aloha Persistence parameter p, 0 < p < 1 Probability of a node transmitting in a slot Tradeoff between collisions and delay 1/7/2004 19

Carrier Sense MA (CSMA) Carrier sensing to avoid collisions with ongoing transmissions Busy channel wait (keep testing) Idle channel transmit Many nodes can be waiting collisions Collisions are reduced by using randomization: Busy channel compute a random time before testing again (random time increases exponentially) 1/7/2004 20

p-persistent CSMA Channel is slotted, BUT Nodes are NOT synchronized Slot length = max propagation delay Sensing occur at the beginning of each slot Busy channel wait a random number of slots Idle channel TX with probability p 1/7/2004 21

MAC for Specific Architectures Centralized MAC Protocols Cellular telephony: Predominant form of wireless systems Wireless ATM: Broadband multimedia services Ad Hoc MAC Protocols Wireless MAC protocols specifically designed for ad hoc networks 1/7/2004 22

Assignments Wireless MAC handout, to page x Updated information on the class web page: www.ece.neu.edu/courses/eceg364/2004sp 1/7/2004 23