COMP 3331/9331: Computer Networks and Applications

Similar documents
Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless and Mobile Networks 7-2

Mohammad Hossein Manshaei 1393

CS 332 Computer Networks Wireless Networks

CSC 4900 Computer Networks: Wireless Networks

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Chapter 6 Wireless and Mobile Networks

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

Last Lecture: Data Link Layer

CSCI-1680 Wireless Chen Avin

COMP 3331/9331: Computer Networks and Applications

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

ECE 4450:427/527 - Computer Networks Spring 2017

Multiple Access in Cellular and Systems

M06:Wireless and Mobile Networks. Corinna Schmitt

CSC 8560 Computer Networks: Wireless and Mobility

Link Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.

Mobile devices for wireless

Mobile and Sensor Systems

Medium Access Control

MULTIPLE ACCESS PROTOCOLS 2. 1

Module 6: Wireless Mobile Networks

Home Area Networks. Outline

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Chapter 5 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks

Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind)

3/20/2012. Data Communications & Networks. Session 5 Main Theme. 2 Wireless and Mobile Networks. Dr. Jean-Claude Franchitti

Chapter 6 Wireless and Mobile Networks

Multiple Access Links and Protocols

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach. Andrei Gurtov

Chapter 3: Wireless and Mobile Networks

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSC 498R: Internet of Things 2

Wireless and Mobile Networks

(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind)

Lecture 15 Wireless and Mobility

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7

Chapter 7. Wireless and Mobile Networks 7-1

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Already finished all layers in the stack, why a separate chapter for wireless and mobile networks?

Chapter 5 Link Layer and LANs

Chapter 6 Wireless and Mobile Networks (Wireless and Mobility)

Announcements: ECE/CS 372 introduction to computer networks. Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon

Wireless Security Background

Last time?! MPLS! Label distribution protocols! Multi Protocol Label Switching! Layer 2.5 protocol! LDP! RSVP!

Block 3: Lecture 1! Part 3: Lecture 1! Wireless networks!

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

MSIT 413: Wireless Technologies Week 8

Multiple Access Links and Protocols

Wireless Local Area Networks. Networks: Wireless LANs 1

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Communication Networks: Wireless and Mobile Communication Networks. Prof. Amir Herzberg BIU, Dept. of CS

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

CMPE 257: Wireless and Mobile Networking

Wireless MACs: MACAW/802.11

Chapter 5: The Data Link Layer

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Networks. Wireless Links. Mike Freedman hap:// Interference / bit errors

Carrier Wave! Signals! Modulation! Internet Protocol Stack!

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Introduction to Wireless Networking. Communication without Wires

Wireless networks. Wireless Network Taxonomy

Mohammad Hossein Manshaei 1393

Data and Computer Communications. Chapter 13 Wireless LANs

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

CSC 401 Data and Computer Communications Networks

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

CMPE 257: Wireless and Mobile Networking

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless LANs. ITS 413 Internet Technologies and Applications

3.1. Introduction to WLAN IEEE

Transcription:

COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1

Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internetenabled phone promise anytime untethered Internet access two important (but different) challenges wireless: communication over wireless link mobility: handling mobile user who changes point of attachment to network Wireless Networks + Security 2

Wireless Networks: Roadmap 6.1 Introduction 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) REST EXCLUDED Wireless Networks + Security 3

Elements of a wireless network network infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not always mean mobility Wireless Networks + Security 4

Elements of a wireless network network infrastructure base station typically connected to wired network relay - responsible for sending packets between wired network and wireless host(s) in its area e.g., cell towers 802.11 access points Wireless Networks + Security 5

Elements of a wireless network network infrastructure wireless link typically used to connect mobile(s) to base station also used as backbone link multiple access protocol coordinates link access various data rates, transmission distance Wireless Networks + Security 6

Characteristics of selected wireless link standards 200 802.11n Data rate (Mbps) 54 5-11 4 1 802.15 802.11a,g 802.11b 802.11a,g point-to-point 802.16 (WiMAX) UMTS/WCDMA-HSPDA, CDMA2000-1xEVDO data 3G cellular enhanced.384 UMTS/WCDMA, CDMA2000 3G.056 IS-95, CDMA, GSM 2G Indoor 10-30m Outdoor 50-200m Mid-range outdoor 200m 4 Km Long-range outdoor 5Km 20 Km Wireless Networks + Security 7

News: White Spaces TV Spectrum (700Mhz range) is freeing up as we move from analog to digital transmissions White Space: Unused radio spectrum space Idea: Why not use this idle spectrum for wireless communication? This idea can be extended to other frequencies as well Secondary users can transmit over unused spectrum until primary users become active Secondary users should be able to sense the presence of primary users US FCC approved the use of the 700MHz TV spectrum Working prototype developed by Microsoft http://news.cnet.com/8301-30686_3-20017435-266.html Wireless Networks + Security 8

Elements of a wireless network network infrastructure infrastructure mode base station connects mobiles into wired network handoff: mobile changes base station providing connection into wired network Wireless Networks + Security 9

Elements of a wireless network Ad hoc mode no base stations nodes can only transmit to other nodes within link coverage nodes organize themselves into a network: route among themselves E.g: wireless sensor networks, vehicular ad-hoc networks Wireless Networks + Security 10

Wireless network taxonomy infrastructure (e.g., APs) no infrastructure single hop host connects to base station (WiFi, WiMAX, cellular) which connects to larger Internet no base station, no connection to larger Internet (Bluetooth, ad hoc nets) multiple hops host may have to relay through several wireless nodes to connect to larger Internet: mesh networks no base station, no connection to larger Internet. May have to relay to reach other a given wireless node MANET, VANET Wireless Networks + Security 11

Wireless Networks: Roadmap 6.1 Introduction 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) Wireless Networks + Security 12

Wireless Link Characteristics (1) Differences from wired link. decreased signal strength: radio signal attenuates as it propagates through matter (path loss) interference from other sources: standardized wireless network frequencies (e.g., 2.4 GHz) shared by other devices (e.g., phone); devices (motors) interfere as well multipath propagation: radio signal reflects off objects ground, arriving at the destination at slightly different times. make communication across (even a point to point) wireless link much more difficult Wireless Networks + Security 13

Wireless Link Characteristics (2) SNR: signal-to-noise ratio larger SNR easier to extract signal from noise (a good thing ) SNR versus BER tradeoffs given physical layer: increase power -> increase SNR->decrease BER (bit error rate) given SNR: choose physical layer that meets BER requirement, giving highest throughput SNR may change with mobility: dynamically adapt physical layer (modulation technique, rate) BER 10-1 10-2 10-3 10-4 10-5 10-6 10-7 SNR (db) = 20 log (amp of signal/amp of noise) 10 20 30 40 SNR(dB) QAM256 (8 Mbps) QAM16 (4 Mbps) BPSK (1 Mbps) Wireless Networks + Security 14

Wireless network characteristics Multiple wireless senders and receivers create additional problems (beyond multiple access): C A B C A B A s signal strength C s signal strength Hidden terminal problem B, A hear each other B, C hear each other A, C can not hear each other means A, C unaware of their interference at B space Signal fading: B, A hear each other B, C hear each other A, C can not hear each other interfering at B Wireless Networks + Security 15

Recall: Multiple Access Protocols Random Access Taking Turns Channel Partitioning TDMA FDMA Now we study CDMA Wireless Networks + Security 16

Code Division Multiple Access (CDMA) used in several wireless broadcast channels (cellular, satellite, etc) standards unique code assigned to each user; i.e., code set partitioning all users share same frequency, but each user has own chipping sequence (i.e., code) to encode data encoded signal = (original data) X (chipping sequence) decoding: inner-product of encoded signal and chipping sequence allows multiple users to coexist and transmit simultaneously with minimal interference (if codes are orthogonal ) Wireless Networks + Security 17

CDMA: Encoding and Decoding Assume original data are represented by 1 and -1 Encoded signal = (original data) modulated by (chipping sequence) assume c m = 1 1 1-1 1-1 -1-1 if data is 1, send 1 1 1-1 1-1 -1-1 if data is -1 send -1-1 -1 1-1 1 1 1 Decoding: inner-product (summation of bit-by-bit product) of encoded signal and chipping sequence if inner-product > threshold, the data is 1; else -1 Wireless Networks + Security 18

CDMA Encode/Decode Code of user m c m : 1 1 1-1 1-1 -1-1 sender data bits code - The number of bits of each chipping sequence is M - The i th data bit is d i ; write it down by duplicating it M times receiver d 1 = -1 1 1 1 1-1 - 1-1 - 1 d 0 = 1 1 1 1 1-1 - 1-1 - 1 slot 1 slot 0 received input code - 1-1 - 1 1-1 1 1 1 1 1 1 1-1 - 1-1 - 1 1 1 1 1 1 1 1 1 slot 1 slot 0 Z i,m = d i. cm - 1-1 - 1-1 - 1-1 - 1-1 channel output Z i,m - 1-1 - 1 1-1 1 1 1 slot 1 channel output M D i = Σ Z. i,m c m=1 m M 1 1 1 1-1 - 1-1 - 1 slot 0 channel output d 1 = -1 slot 1 channel output d 0 = 1 slot 0 channel output Wireless Networks + Security 19

CDMA: two-sender interference Sender 1 Code 1: 1 1 1-1 1-1 -1-1 Code 2: 1-1 1 1 1-1 1 1 Sender 2 Wireless Networks + Security 20

CDMA codes CDMA codes are orthogonal. E.g: (1,1,1,-1,1,-1,-1,-1) and (1,-1,1,1,1,-1,1,1) Inner product of the codes should be zero C 1 : 1 1 1-1 1-1 -1-1 C 2 : 1-1 1 1 1-1 1 1 ----------------------------------------- C 1. C 2 = 1 +(-1) + 1 + (-1) +1 + 1+ (-1)+(-1)=0 If there are multiple CDMA codes all of the codes have to be orthogonal to each other. E.g: 3 codes: A, B and C. Then A x B = 0, B x C = 0 and A x C = 0 Wireless Networks + Security 21

Roadmap 6.1 Introduction 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) Wireless Networks + Security 22

IEEE 802.11 Wireless LAN 802.11b 2.4-5 GHz unlicensed spectrum up to 11 Mbps direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code 802.11a 5-6 GHz range up to 54 Mbps 802.11g 2.4-5 GHz range up to 54 Mbps 802.11n: multiple antennae 2.4-5 GHz range up to 200 Mbps Standard ratified in Sept 2009 all use CSMA/CA for multiple access all have base-station and ad-hoc network versions Wireless Networks + Security 23

802.11 LAN architecture BSS 1 AP Internet switch or router AP wireless host communicates with base station base station = access point (AP) Basic Service Set (BSS) (aka cell ) in infrastructure mode contains: wireless hosts access point (AP): base station ad hoc mode: hosts only BSS 2 Wireless Networks + Security 24

802.11: Channels, association 802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels at different frequencies AP admin chooses frequency for AP interference possible: channel can be same as that chosen by neighboring AP! 3 non-overlapping channels in 802.11b: 1, 6 and 11 host: must associate with an AP scans channels, listening for beacon frames containing AP s name (SSID) and MAC address selects AP to associate with may perform authentication will typically run DHCP to get IP address in AP s subnet Wireless Networks + Security 25

802.11b channels Wireless Networks + Security 26

802.11: passive/active scanning BBS 1 BBS 2 BBS 1 BBS 2 AP 1 1 2 1 3 AP 2 AP 1 2 1 2 3 4 AP 2 H1 H1 Passive Scanning: (1) beacon frames sent from APs (host scans for beacons on 11 channels) (2) association Request frame sent: H1 to selected AP (3) association Response frame sent: Selected AP to H1 Active Scanning: (1) Probe Request frame broadcast from H1 (2) Probes response frame sent from APs (3) Association Request frame sent: H1 to selected AP (4) Association Response frame sent: Selected AP to H1 Wireless Networks + Security 27

IEEE 802.11: multiple access avoid collisions: 2 + nodes transmitting at same time 802.11: CSMA - sense before transmitting don t collide with ongoing transmission by other node 802.11: no collision detection! Why? difficult to receive (sense collisions) when transmitting due to weak received signals (fading) can t sense all collisions in any case: hidden terminal, fading goal: avoid collisions: CSMA/C(ollision)A(voidance) C A B C A B A s signal strength C s signal strength space Wireless Networks + Security 28

IEEE 802.11 MAC Protocol: CSMA/CA 802.11 sender 1 if sense channel idle for DIFS then transmit entire frame (no CD) 2 if sense channel busy then start random backoff time timer counts down while channel idle transmit when timer expires if no ACK, increase random backoff interval, repeat 2 802.11 receiver - if frame received OK return ACK after SIFS (ACK needed due to hidden terminal problem) DIFS sender data ACK receiver SIFS Wireless Networks + Security 29

CSMA/CA vs CSMA/CD In 802.11 if sender senses channel to be busy, the sender backs off for a random time (based on exponential back-off) In Ethernet, if the sender senses channel to be busy, the sender keeps sensing the channel until it becomes free Why this difference? Wireless Networks + Security 30

Avoiding collisions & dealing with hidden nodes idea: allow sender to reserve channel rather than random access of data frames: avoid collisions of long data frames sender first transmits small request-to-send (RTS) packets to BS using CSMA (OPTIONAL used for Longer data frames) RTSs may still collide with each other (but they re short) BS broadcasts clear-to-send CTS in response to RTS after waiting for SIFS duration RTS/CTS heard by all nodes sender transmits data frame after waiting for SIFS duration other stations defer transmissions by setting Network Allocation Vector (NAV) Avoid data frame collisions completely using small reservation packets! Wireless Networks + Security 31

Collision Avoidance: RTS-CTS exchange A AP B RTS(A) RTS(A) reservation collision RTS(B) CTS(A) CTS(A) DATA (A) defer time ACK(A) ACK(A) Wireless Networks + Security 32

RTS/CTS Illustration sender DIFS RTS data receiver SIFS CTS SIFS other stations NAV (RTS) NAV (CTS) defer access DIFS new contention data t RTS A RTS CTS AP CTS B Wireless Networks + Security 33

802.11 frame: addressing frame control 2 2 6 6 6 2 6 0-2312 4 duration address 1 address 2 address 3 seq control address 4 payload CRC Address 1: MAC address of wireless host or AP to receive this frame Address 2: MAC address of wireless host or AP transmitting this frame Address 3: MAC address of router interface to which AP is attached Address 4: used only in ad hoc mode Wireless Networks + Security 34

802.11 frame: addressing H1 R1 router Internet AP 802.3 (Ethernet) frame AP MAC addr H1 MAC addr R1 MAC addr address 1 address 2 address 3 R1 MAC addr AP MAC addr dest. address source address 802.11 frame Wireless Networks + Security 35

802.11 frame: more duration of reserved transmission time (RTS/CTS) frame seq # (for reliable ARQ) frame control 2 2 6 6 6 2 6 0-2312 4 duration address 1 address 2 address 3 seq control address 4 payload CRC Protocol version 2 2 4 1 1 1 1 1 1 Type Subtype To AP From AP More frag 1 1 Power Retry mgt More data WEP Rsvd frame type (RTS, CTS, ACK, data) Wireless Networks + Security 36

802.11: mobility within same subnet H1 remains in same IP subnet: IP address can remain same switch: which AP is associated with H1? self-learning (link-layer): switch will see frame from H1 and remember which switch port can be used to reach H1 BBS 1 router switch AP 1 AP 2 H1 BBS 2 Wireless Networks + Security 37

802.11: advanced capabilities Rate Adaptation base station, mobile dynamically change transmission rate (physical layer modulation technique) as mobile moves, SNR varies QAM256 (8 Mbps) QAM16 (4 Mbps) BPSK (1 Mbps) operating point BER 10-1 10-2 10-3 10-4 10-5 10-6 10-7 10 20 30 40 SNR(dB) 1. SNR decreases, BER increase as node moves away from base station 2. When BER becomes too high, switch to lower transmission rate but with lower BER Wireless Networks + Security 38

802.15: personal area network less than 10 m diameter replacement for cables (mouse, keyboard, headphones) ad hoc: no infrastructure master/slaves: slaves request permission to send (to master) master grants requests 802.15: evolved from Bluetooth specification 2.4-2.5 GHz radio band up to 4Mbps Frequency hopping spread spectrum (FHSS) S M S P S P M P S P Master device Slave device radius of coverage P Parked device (inactive) Wireless Networks + Security 39

802.16: WiMAX (SELF-STUDY) like 802.11 & cellular: base station model transmissions to/from base station by hosts with omnidirectional antenna base station-to-base station backhaul with point-topoint antenna unlike 802.11: range ~ 6 miles ( city rather than coffee shop ) ~14 Mbps Long Term Evolution (LTE) - emerging point-to-point point-to-multipoint Wireless Networks + Security 40

802.16: WiMAX: downlink, uplink scheduling transmission frame down-link sub-frame: base station to node uplink sub-frame: node to base station pream. DL- MAP UL- MAP DL burst 1 DL burst 2 DL burst n Initial maint. request conn. SS #1 SS #2 SS #k downlink subframe uplink subframe base station tells nodes who will get to receive (DL map) and who will get to send (UL map), and when WiMAX standard provide mechanism for scheduling, but not scheduling algorithm Wireless Networks + Security 41

Quiz The 802.11 protocol does not implement collision detection because Collision detection was found to be useless in wired Ethernet The adapter would not be able to detect all collisions due to hidden terminal Collisions are not possible in 802.11 In 802.11 a host can re-associate with a new AP in the subnet without changing its IP address True or False Wireless Networks + Security 42

Wireless, mobility: impact on higher layer protocols logically, impact should be minimal best effort service model remains unchanged TCP and UDP can (and do) run over wireless, mobile but performance-wise: packet loss/delay due to bit-errors (discarded packets, delays for link-layer retransmissions), and handoff TCP interprets loss as congestion, will decrease congestion window un-necessarily delay impairments for real-time traffic limited bandwidth of wireless links Wireless Networks + Security 43

Summary Wireless Networks + Security 44