Raj Jain. Raj Jain. The Ohio State University

Similar documents
Wireless Local Area Networks: Recent Developments

Wireless Local Area Networks (WLANs) Part I

Wireless Data Networking IEEE & Overview of IEEE b

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Data and Computer Communications. Chapter 13 Wireless LANs

IEEE Wireless LANs Part I: Basics

Wireless and Mobile Networks

Computer Networks. Wireless LANs

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

MSIT 413: Wireless Technologies Week 8

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Chapter 6 Medium Access Control Protocols and Local Area Networks

Guide to Wireless Communications, Third Edition. Objectives

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Lecture 16: QoS and "

Wireless Local Area Networks. Networks: Wireless LANs 1

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

ICE 1332/0715 Mobile Computing (Summer, 2008)

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Mobile Communications Chapter 7: Wireless LANs

Wireless# Guide to Wireless Communications. Objectives

Wireless Communication and Networking CMPT 371

Local Area Networks NETW 901

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal

Mobile & Wireless Networking. Lecture 7: Wireless LAN

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communications. Data Link Layer Protocols Wireless LANs

Mohamed Khedr.

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless Communication and Networking CMPT 371

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Overview of Wireless LANs

ATM Networking: Issues and Challenges Ahead

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

Introduction to IEEE

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Data and Computer Communications

LECTURE 8. Mobile IP

Mobile Communications Chapter 7: Wireless LANs

Wireless Local Area Network (IEEE )

Wireless LAN -Architecture

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Mobile Communications Chapter 7: Wireless LANs

Investigation of WLAN

Hands-On Exercises: IEEE Standard

Chapter 3.1 Acknowledgment:

CSE 461: Wireless Networks

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

IEEE Technical Tutorial. Introduction. IEEE Architecture

Lecture (08) Wireless Traffic Flow and AP Discovery

CHAPTER 8: LAN Standards

IEEE MAC Sublayer (Based on IEEE )

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Overview Computer Networks. Single Cell Wireless LAN Configuration. Applications - LAN Extension. Applications Cross-Building Interconnect

Transmission Control Protocol over Wireless LAN

Advanced Computer Networks WLAN

Mobile Communications Chapter 7: Wireless LANs

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless

Module 6: Wireless Mobile Networks

3.1. Introduction to WLAN IEEE

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Wireless technology Principles of Security

MAC in /20/06

Wireless Communications

CSCI-1680 Wireless Chen Avin

2 Wireless Networks. 2.1 Introduction. 2.2 IEEE b. Unit 2: Wireless Networks 1

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

CS263: Wireless Communications and Sensor Networks

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Wireless Communication Session 4 Wi-Fi IEEE standard

Ethernet Switches (more)

Functions of physical layer:

Mobile IP and Mobile Transport Protocols

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Multiple Access Links and Protocols

ECE 435 Network Engineering Lecture 8

CS263: Wireless Communications and Sensor Networks

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

ECS-087: Mobile Computing

Lesson 2-3: The IEEE x MAC Layer

Wireless Intro : Computer Networking. Wireless Challenges. Overview. TCP on wireless links Wireless MAC Assigned reading.

Computer Communication III

Wireless LAN. Access Point. Provides network connectivity over wireless media

CIS 632 / EEC 687 Mobile Computing

IEEE Wireless LANs

Medium Access Control Sublayer

Transcription:

Networking Issues for Mobile Computing Professor of Computer and Information Sciences Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 1

Overview Wireless LAN standards: IEEE 802.11 Wireless ATM Mobile IP Mobility and TCP Mobile computing: Disconnected Operation 3

Wireless LAN Standards IEEE 802.11: Media access protocol. Similar to Ethernet. HIPERLAN: LAN standard developed by European Telecommunications Standards Institute (ETSI)'s RES10. Uses 5.2 and 17.1 GHz bands. WINFORUM: Started by Apple to get Spectrum for data PCS. Developing Spectrum Etiquette. 4

Hidden Node Problem A B C C cannot hear A. It may start transmitting while A is also transmitting Can't detect collision. 5

IEEE 802.11 MAC: CSMA/CA Carrier Sense Multiple Access with Collision Avoidance Listen before you talk. If the medium is busy, the transmitter backs off for a random period. Avoids collision by sending a short message: Ready to send (RTS) RTS contains destination address and duration of message. Tells everyone that they should backoff for the duration. Destination sends: Clear to send (CTS) Can not detect collision Each packet is acked. MAC level retransmission if not acked. 6

4-Way Handshake Access Point Ready to send Mobile Node Clear to send Data Ack 7

Peer-to-Peer or Base Stations? Ad-hoc (Autonomous) Group: Two stations can communicate All stations have the same logic No infrastructure Suitable for small area Infrastructure Based: Access points (base units) Stations can be simpler than bases. Base provide connection for off-network traffic Base provide Location tracking, directory, authentication Scalable to large networks IEEE 802.11 provides both. 9

IEEE 802.11 MAC: Priorities DIFS Busy Carrier Sensed DIFS PIFS SIFS Initial interframe space (IFS) Contention Window Random Backoff Highest priority frames, e.g., Acks, use short IFS (SIFS) Medium priority time-critical frames use Point Coordination Function IFS (PIFS) Next Frame Asynchronous data frames use Distributed coordination function IFS (DIFS) Time 11

Time Critical Services Beacon Time Timer critical services use Point Coordination Function (PCF) The point coordinator (PCF station) allows only one station to access PCF station sends a beacon frame to inform all stations. Then uses a polling frame to allow a particular station to have contention-free access Length of Contention Free Period (CFP) varies with the load. Implementation of PCF is optional CFP Reptition Interval Contention-Free Period Contention Period PCF Access 12 DCF Access

IEEE 802.11 Physical Layer Three Phys specified: Direct Sequence Spread Spectrum (DSSS) Frequency Hopping Spread Spectrum (FHSS) Diffused Infrared (DFIR): Wide angle DSSS and FHSS operate in 2.4-2.4835 GHz Industrial, Scientific, and Medical (ISM) band Some early systems use 902-928 MHz band. ISM band is available in many countries. Different PHY specifications for 915-MHz, 2.4-, 5.2 GHz, and Infrared (850-900 nm) bands. SS at 1 or 2 Mbps. DFIR at 1 Mbps. Different Phys Interoperability issues 13

IEEE 802.11 MAC Why 2.4 GHz? U.S. Europe 5.8 GHz (ISM) Japan 5.2 GHz (Future?) 2.4 GHz (ISM) 1.9 GHz WinForum 5.2 GHz Hiperlan 2.4 GHz (ISM) 5.2 GHz (Future?) 2.4 GHz (ISM) 915 MHz (ISM) 14

IEEE 802.11 Security Authentication: New nodes issue a "request for authentication" Network sends a block of random text. The node encrypts it with network password and returns. Currently, one shared secret key (password) per network. The same encryption algorithm is used for privacy. Wired Equivalency Privacy (WEP) Algorithm is based on RC4 PRNT algorithm developed by RSA Data Security, Inc. 15

Power Management A station can be in one of three states: Transmitter on Receiver only on Dozing: Both transmitter and receivers off. Access point buffers traffic for dozing stations. Traffic indication map included in each beacon. Dozing stations wake up to listen to the beacon. If there is data waiting for it, the station sends a poll frame to get the data. 16

FHSS Phy 2.4 GHz ISM Band. (Only 2.471-2.497 MHz in Japan) 1 and 2 Mbps Three sets of frequency hopping patterns. Each set has 22 hopping sequences (22 Channels). Total 66 channels. 12 in Japan. Consecutive frequencies in each sequence are at least 6 MHz apart to avoid a narrowband interferer. Adjacent or overlapping cells use different patterns. Many channels FH systems better than DS in dense (overlapping cells) environment. 17

DSSS Phy 2.4 GHz band 11 chip spreading factor 11 DS center frequencies (11 Channels) Only 3 channels without overlap. 10 mw to 100 mw transmitted power 1 and 2 Mbps DBPSK for 1 Mbps. DQPSK for 2 Mbps. 18

Infrared Phy Baseband transmission 850 to 950 nm range of IR 1 Mbps or 2 Mbps Diffuse IR Up to 10 m in typical offices Could be 20 m with better receivers. For 1 Mbps, 4-bits are mapped to 16 ppm symbol For 2 Mbps, 2 bits are mapped to 4 ppm symbol 19

Status and Future Current Status: To be final by Spring 1996 MAC has been fine-tuned. FH Phy layer to be resolved in July 95 meeting IR, DS Phys almost complete. More bandwidth in future by: 1. Better encoding: Multilevel modulation 8 Mbps 2. Fewer channels with more bandwidth 4 MHz channels. Or Entire ISM band for one channel. 3. Find another band. May get 150 MHz band in 5-GHz band. Fifteen 10-MHz channels with 15-20 Mb/s. 20

Wireless ATM ATM cell size designed for 64 kbps May be too big for some wireless LANs Wireless LANs may use 16 or 24 byte payload Compress ATM header (12 bit VPI/VCI not 28 bits) Expanded to standard ATM at the base station Add wireless data-link header Service Type: CBR, VBR, ABR Error control: 10-bit sequence numbers, 16-bit CRC, HDLC style retransmissions Segmentation and reassembly of small payload units Handoff support: Bits in header indicate PDUs before and after handoff 21

Mobile IP: Features You can take you notebook to any location Finds nearby IP routers and connects automatically You don't even have to find a phone jack Only "Mobility Aware" routers and mobile units need new s/w Other routers and hosts can use current IP No new IP addresses or address formats Secure: Allows authentication Also supports mobile networks (whole airplane/car load of mobile units) 22

Impact Your Email is continuously delivered You can start a telnet or x-window session as if local Continuous access to your home resources Access to local resources: Printers You wouldn't miss a mail even during meetings Airports, Hotels, Hospitals will provide "Mobile IP connectivity" Better connectivity More productive meetings and conferences Cities will feature "Mobile IP Accessways" You can compute while driving 23

Mobile IP: Terminology Mobile Node (MN) Home Agent (HA), Foreign Agent (FA) Care-of-address (COA): Address of the end-of-tunnel towards the mobile node Correspondent Node (CN): Home Address: Mobile node s permanent IP address Node moves Home net MN HA MN FA New net 24 CN

Mobile IP: Processes Agent Discovery: To find agents Home agents and foreign agents advertise periodically on network layer and optionally on datalink They also respond to solicitation from mobile node Mobile selects an agent and gets/uses care-of-address Registration Mobile registers its care-of-address with home agent Either directly or through foreign agent Home agent sends a reply to the mobile node via FA Each "Mobility binding" has a negotiated lifetime limit To continue, reregister within lifetime 25

Processes (Cont) Return to Home: Mobile node deregisters with home agent sets care-of-address to its permanent IP address Lifetime = 0 Deregistration Deregistration with foreign agents is not required. Expires automatically Simultaneous registrations with more than one COA allowed (for handoff) 26

Encaptulation/Tunneling Home agent intercepts mobile node's datagrams and forwards them to care-of-address Home agent tells local nodes and routers to send mobile node's datagrams to it Decaptulation: Datagram is extracted and sent to mobile node Correspondent Home Agent Intermediate Routers Foreign Agent Mobile Host IP Header To: COA IP Header To: Mobile Info 27

TCP Mobility Considerations TCP Timers: Uses delays for timeouts and retransmission Handoffs Larger variation in delays Unnecessary retransmission Congestion Management: Uses loss as congestion indication Decreases windows on retransmissions (Slow start) Handoffs and frequent errors False congestion signals Low throughput One Solution: Split the connection: Wired and wireless. No TCP on wireless hop. 28

CODA File System Automatic caching of required files Automatic resynchronization upon connection Conflict copies marked inconsistent Manual repair Allows volume replication at multiple servers Allows partial network failures Voluntary and involuntary disconnections are treated similarly. 29

Disconnected Operation in CODA Disconnection Emulation Hoarding Physical Reconnection Logical Reconnection Reintegration Optimistic replication Hope no conflict Allow modification even when all copies are not accessible. Conflicts resolved later using logs and manual repair Maintains log during emulation Integration: Replay log is shipped to all servers Allows possibility of low bandwidth reconnection 30

Hoarding Prioritized cache management: Implicit and Explicit information. User can specify a prioritized list of files and directories Highest priority Sticky Retain at all times The system can monitor file access while user performs specified operations. All ancestors of objects should also be cached, e.g., c:\windows\system Walks every 10 minutes or on user request Update versions. Purge lower priority items. Get all higher priority items. 50 MB sufficient for a day 31

Hoarding (Cont) If the server copy is modified, The client cache is not immediately updated. Update only when needed or next hoard walk. If something is modified, it will be modified again soon. 32

Emulation All update activities are logged. Log is optimized to conserve disk space. E.g., File overwritten twice discard previous log entry To survive crashes, cache and logs are kept in non-volatile storage (disk). If disk becomes full with cache or log, compress log, write to floppy, or reintegrate. 33

Summary IEEE 802.11: 1 to 2 Mbps, CSMA/CA ATM: Per-hop error control and recovery. IP: Provides transparent mobility via home/foreign agents TCP: Varying delays and errors More adaptive algorithms Mobile Computing: Transparent disconnected operation 34

Products Mobile IP : DEC: RoamAbout Mobile IP (V.2.0) Novell: Mobile IPX Disconnected Operation: AnyPlace by Symmetrical Technologies, Amherst, NH Allows user to create, retrieve, modify, delete and rename files while disconnected from server. 35

IEEE 802.11: References K. Pahlavan, et al, "Trends in Local Wireless Networks," IEEE Communications Magazine, March 1995, pp. 88-95. C. Links, et al, "Universal Wireless LANs," Byte, May 1994, pp. 99-108. L. Goldberg, "Wireless LANs: Mobile-Computing's Second Wave," Electronic Design, June 26, 1995. IEEE 802.11 standard committee archive (encrypted standard) file://atg.apple.com/pub/802.11/ 36

Wireless ATM: References D. Raychaudhuri and N.D. Wilson, "ATM-Based Transport Architecture for Multiservices Wireless Personal Communication Networks," IEEE JSAC, October 1992, pp. 1401-1413. 37

Mobile IP: Internet Drafts Internet Draft, "IP Mobility Support," 07/07/1995, <draft-ietf-mobileip-protocol-11.txt> Internet Draft, "Route Optimization in Mobile IP," 07/07/1995, <draft-ietf-mobileip-optim-02.txt> Internet Draft, "Minimal Encapsulation within IP," 07/07/1995, <draft-ietf-mobileip-minenc-00.txt> Internet Draft, "IP Encapsulation within IP," 07/07/1995, <draft-ietf-mobileip-ip4inip4-00.txt> RFC1688, "IPng Mobility Considerations" by W. Simpson, 08/11/1994, 9 pp. 38

Mobile IP: References Mobile-IP working group homepage, http://www.ietf.cnri.reston.va.us/html.charters/mobileipcharter.html E. Amir, et al, "Efficient TCP over Networks with Wireless Links," Available on-line via http:\\www.berkeley.edu\ (?) C.K. Kantarjiev, et al, "Experiences with X in a Wireless Environment," Proc. USENIX Mobile and Location Independent Computing Symposium, 1993, pp. 117-28. 39

Mobile Computing: References G.H. Forman and J. Zahorjan, "The Challenges of Mobile Computing," IEEE Computer, April 1994, pp. 38-47. T. Imielinski, and B.R. Badrinath, "Mobile Wireless Computing: Challenges in Data Management," Available online via http://winwww.rutgers.edu/ M. Satyanarayanan, "Scalable, Secure, and Highly Available Distributed File Access," IEEE Computer, May 1990, pp. 9-20. J.J. Kistler and M. Satyanarayanan, "Disconnected Operation in the Coda File System," ACM Transactions on Computer Systems, Vol. 10, No. 1, February 1992, pp. 3-25. Mobile Computing Bibliography, http://www.ira.uka.de/ftp/ira/bibliography/distributed/mobile.ht ml 40

Recent Advances in Networking and Telecommunications Seminar Series 1995 Last Tuesday of the month (mostly), 3:45-5:15 PM January 31: High Speed Networks: Trends and Issues February 21: ATM Networks: Introduction March 28: ATM Networks: Advanced Issues April 25: Multimedia Networks May 30: Multimedia Networks June 27: Wireless Networks (Denny 352, 164 West 17th Ave) July 25: Mobile Computing (Denny 352, 164 West 17th Ave) September 19: Congestion Control or High Speed LANs? October 31: Signaling or New Telecom Data Services? November 28: All-Optical Networks 41