Chapter 5 Link Layer and LANs

Similar documents
CSC 4900 Computer Networks: Link Layer (2)

Link Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Mohammad Hossein Manshaei 1393

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Wireless and Mobile Networks 7-2

The Link Layer and LANs: Ethernet and Swiches

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Chapter 4. DataLink Layer. Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.

CS 3516: Advanced Computer Networks

CS 332 Computer Networks Wireless Networks

Chapter 5: The Data Link Layer. Chapter 5 Link Layer and LANs. Ethernet. Link Layer. Star topology. Ethernet Frame Structure.

CS 455/555 Intro to Networks and Communications. Link Layer Addressing, Ethernet, and a Day in the Life of a Web Request

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

CSC 4900 Computer Networks: Wireless Networks

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Summary of MAC protocols

COMP 3331/9331: Computer Networks and Applications

Chapter 5 Data Link Layer

Chapter 6 The Link Layer and LANs

Medium Access Control

Module 10 Data Link Layer CS655! 10-1!

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Principles behind data link layer services

Chapter 6 Wireless and Mobile Networks

Master Course Computer Networks IN2097

Chapter 5 Link Layer. Down Approach. Computer Networking: A Top. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Multiple Access in Cellular and Systems

Principles behind data link layer services:

Principles behind data link layer services:

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network

Principles behind data link layer services:

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network

Lecture 9 Ethernet and other Link Layer protocols

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CC451 Computer Networks

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Last Lecture: Data Link Layer

Medium Access Protocols

Chapter 6 The Link Layer and LANs

Chapter 5 Data Link Layer

Link layer: introduction

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

Master Course Computer Networks IN2097

MULTIPLE ACCESS PROTOCOLS 2. 1

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Chapter V: Link Layer

Link layer, LANs: outline. Chapter 5-2 Link Layer. MAC addresses (more) MAC addresses

Module 4 Data Link Layer CS655! 4-1!

CSCI-1680 Wireless Chen Avin

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack

Wireless and Mobile Networks

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

COMP 3331/9331: Computer Networks and Applications

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 6 The Link Layer and LANs

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

CSCD 330 Network Programming Spring 2017

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Link Layer and LANs. Our Goals. Link Layer

ECE 4450:427/527 - Computer Networks Spring 2017

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

INTRODUCTION, SERVICES. Data-link layer has responsibility of transferring datagram from one node to physically adjacent node over a link

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Chapter V: Link Layer

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks

Multiple Access Links and Protocols

Link Layer and LANs. CMPS 4750/6750: Computer Networks

CSCI Computer Networks Fall 2016

Chapter 6 Wireless and Mobile Networks

CSC 401 Data and Computer Communications Networks

Chapter 5: Link layer

CSCI Computer Networks Spring 2017

Chapter 5: The Data Link Layer

LINK LAYER AND LANS 1

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Link Layer and Ethernet

Chapter 5: The Data Link Layer

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Chapter 5 Wireless and Mobile Networks

Wireless and Mobile Networks

Chapter 5 part 2 LINK LAYER. Computer Networks Timothy Roscoe Summer Networks & Operating Systems Computer Networks

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose

Transcription:

Chapter 5 Link Layer and LANs A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: If you use these slides (e.g., in a class) in substantially unaltered form, that you mention their source (after all, we d like people to use our book!) If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Thanks and enjoy! JFK/KWR All material copyright 1996-2010 J.F Kurose and K.W. Ross, All Rights Reserved Data Link Layer 5-1

Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request Data Link Layer 5-2

MAC Addresses and ARP 32-bit IP address: network-layer address used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address: function: get frame from one interface to another physically-connected interface (same network) 48 bit MAC address (for most LANs) burned in NIC ROM, also sometimes software settable Data Link Layer 5-3

LAN Addresses and ARP Each adapter on LAN has unique LAN address 1A-2F-BB-76-09-AD Broadcast address = FF-FF-FF-FF-FF-FF 71-65-F7-2B-08-53 LAN (wired or wireless) 58-23-D7-FA-20-B0 = adapter 0C-C4-11-6F-E3-98 Data Link Layer 5-4

LAN Address (more) MAC address allocation administered by IEEE manufacturer buys portion of MAC address space (to assure uniqueness) analogy: (a) MAC address: like Social Security Number (b) IP address: like postal address MAC flat address portability can move LAN card from one LAN to another IP hierarchical address NOT portable address depends on IP subnet to which node is attached Data Link Layer 5-5

ARP: Address Resolution Protocol Question: how to determine MAC address of B knowing B s IP address? 137.196.7.23 71-65-F7-2B-08-53 LAN 137.196.7.78 1A-2F-BB-76-09-AD 137.196.7.14 58-23-D7-FA-20-B0 Each IP node (host, router) on LAN has ARP table ARP table: IP/MAC address mappings for some LAN nodes < IP address; MAC address; TTL> TTL (Time To Live): time after which address mapping will be forgotten (typically 20 min) 137.196.7.88 0C-C4-11-6F-E3-98 Data Link Layer 5-6

ARP protocol: Same LAN (network) A wants to send datagram to B, and B s MAC address not in A s ARP table. A broadcasts ARP query packet, containing B's IP address dest MAC address = FF- FF-FF-FF-FF-FF all machines on LAN receive ARP query B receives ARP packet, replies to A with its (B's) MAC address frame sent to A s MAC address (unicast) A caches (saves) IP-to- MAC address pair in its ARP table until information becomes old (times out) soft state: information that times out (goes away) unless refreshed ARP is plug-and-play : nodes create their ARP tables without intervention from net administrator Data Link Layer 5-7

Addressing: routing to another LAN walkthrough: send datagram from A to B via R. focus on addressing - at both IP (datagram) and MAC layer (frame) assume A knows B s IP address assume A knows B s MAC address (how?) assume A knows IP address of first hop router, R (how?) assume A knows MAC address of first hop router interface (how?) A 111.111.111.111 74-29-9C-E8-FF-55 R 222.222.222.220 1A-23-F9-CD-06-9B B 222.222.222.222 49-BD-D2-C7-56-2A 111.111.111.112 CC-49-DE-D0-AB-7D 111.111.111.110 E6-E9-00-17-BB-4B 222.222.222.221 88-B2-2F-54-1A-0F Data Link Layer 5-8

Addressing: routing to another LAN A creates IP datagram with IP source A, destination B A creates link-layer frame with R's MAC address as dest, frame contains A-to-B IP datagram MAC src: 74-29-9C-E8-FF-55 MAC dest: E6-E9-00-17-BB-4B IP src: 111.111.111.111 IP dest: 222.222.222.222 IP Eth Phy A 111.111.111.111 74-29-9C-E8-FF-55 R 222.222.222.220 1A-23-F9-CD-06-9B B 222.222.222.222 49-BD-D2-C7-56-2A 111.111.111.112 CC-49-DE-D0-AB-7D 111.111.111.110 E6-E9-00-17-BB-4B 222.222.222.221 88-B2-2F-54-1A-0F Data Link Layer 5-9

Addressing: routing to another LAN frame sent from A to R frame received at R, datagram removed, passed up to IP IP Eth Phy A 111.111.111.111 74-29-9C-E8-FF-55 MAC src: 74-29-9C-E8-FF-55 MAC dest: E6-E9-00-17-BB-4B IP src: 111.111.111.111 IP dest: 222.222.222.222 IP Eth Phy R 222.222.222.220 1A-23-F9-CD-06-9B B 222.222.222.222 49-BD-D2-C7-56-2A 111.111.111.112 CC-49-DE-D0-AB-7D 111.111.111.110 E6-E9-00-17-BB-4B 222.222.222.221 88-B2-2F-54-1A-0F Data Link Layer 5-10

Addressing: routing to another LAN R forwards datagram with IP source A, destination B R creates link-layer frame with B's MAC address as dest, frame contains A-to-B IP datagram IP Eth Phy MAC src: 1A-23-F9-CD-06-9B MAC dest: 49-BD-D2-C7-56-2A IP src: 111.111.111.111 IP dest: 222.222.222.222 IP Eth Phy A 111.111.111.111 74-29-9C-E8-FF-55 R 222.222.222.220 1A-23-F9-CD-06-9B B 222.222.222.222 49-BD-D2-C7-56-2A 111.111.111.112 CC-49-DE-D0-AB-7D 111.111.111.110 E6-E9-00-17-BB-4B 222.222.222.221 88-B2-2F-54-1A-0F Data Link Layer 5-11

Addressing: routing to another LAN R forwards datagram with IP source A, destination B R creates link-layer frame with B's MAC address as dest, frame contains A-to-B IP datagram IP Eth Phy MAC src: 1A-23-F9-CD-06-9B MAC dest: 49-BD-D2-C7-56-2A IP src: 111.111.111.111 IP dest: 222.222.222.222 IP Eth Phy A 111.111.111.111 74-29-9C-E8-FF-55 R 222.222.222.220 1A-23-F9-CD-06-9B B 222.222.222.222 49-BD-D2-C7-56-2A 111.111.111.112 CC-49-DE-D0-AB-7D 111.111.111.110 E6-E9-00-17-BB-4B 222.222.222.221 88-B2-2F-54-1A-0F Data Link Layer 5-12

Addressing: routing to another LAN R forwards datagram with IP source A, destination B R creates link-layer frame with B's MAC address as dest, frame contains A-to-B IP datagram MAC src: 1A-23-F9-CD-06-9B MAC dest: 49-BD-D2-C7-56-2A IP src: 111.111.111.111 IP dest: 222.222.222.222 IP Eth Phy A 111.111.111.111 74-29-9C-E8-FF-55 111.111.111.112 CC-49-DE-D0-AB-7D R 111.111.111.110 E6-E9-00-17-BB-4B 222.222.222.220 1A-23-F9-CD-06-9B B 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F Data Link Layer 5-13

Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request Data Link Layer 5-14

Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology simpler, cheaper than token LANs and ATM kept up with speed race: 10 Mbps 10 Gbps Metcalfe s Ethernet sketch Data Link Layer 5-15

Star topology bus topology popular through mid 90s all nodes in same collision domain (can collide with each other) today: star topology prevails active switch in center each spoke runs a (separate) Ethernet protocol (nodes do not collide with each other) switch bus: coaxial cable star Data Link Layer 5-16

Ethernet Frame Structure Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame Preamble: 7 bytes with pattern 10101010 followed by one byte with pattern 10101011 used to synchronize receiver, sender clock rates Data Link Layer 5-17

Ethernet Frame Structure (more) Addresses: 6 bytes if adapter receives frame with matching destination address, or with broadcast address (e.g. ARP packet), it passes data in frame to network layer protocol otherwise, adapter discards frame Type: indicates higher layer protocol (mostly IP but others possible, e.g., Novell IPX, AppleTalk) CRC: checked at receiver, if error is detected, frame is dropped Data Link Layer 5-18

Ethernet: Unreliable, connectionless connectionless: No handshaking between sending and receiving NICs unreliable: receiving NIC doesn t send acks or nacks to sending NIC stream of datagrams passed to network layer can have gaps (missing datagrams) gaps will be filled if app is using TCP otherwise, app will see gaps Ethernet s MAC protocol: unslotted CSMA/CD Data Link Layer 5-19

Ethernet CSMA/CD algorithm 1. NIC receives datagram from network layer, creates frame 2. If NIC senses channel idle, starts frame transmission If NIC senses channel busy, waits until channel idle, then transmits 3. If NIC transmits entire frame without detecting another transmission, NIC is done with frame! 4. If NIC detects another transmission while transmitting, aborts and sends jam signal 5. After aborting, NIC enters exponential backoff: after mth collision, NIC chooses K at random from {0,1,2,,2 m -1}. NIC waits K 512 bit times, returns to Step 2 Data Link Layer 5-20

Ethernet s CSMA/CD (more) Jam Signal: make sure all other transmitters are aware of collision; 48 bits Bit time:.1 microsec for 10 Mbps Ethernet ; for K=1023, wait time is about 50 msec See/interact with Java applet on AWL Web site: highly recommended! Exponential Backoff: Goal: adapt retransmission attempts to estimated current load heavy load: random wait will be longer first collision: choose K from {0,1}; delay is K 512 bit transmission times after second collision: choose K from {0,1,2,3} after ten collisions, choose K from {0,1,2,3,4,,1023} Data Link Layer 5-21

CSMA/CD efficiency T prop = max prop delay between 2 nodes in LAN t trans = time to transmit max-size frame efficiency 1 = 1+ 5 t prop /t trans efficiency goes to 1 as t prop goes to 0 as t trans goes to infinity better performance than ALOHA: and simple, cheap, decentralized! Data Link Layer 5-22

802.3 Ethernet Standards: Link & Physical Layers many different Ethernet standards common MAC protocol and frame format different speeds: 2 Mbps, 10 Mbps, 100 Mbps, 1Gbps, 10G bps different physical layer media: fiber, cable application transport network link physical 100BASE-TX 100BASE-T4 MAC protocol and frame format 100BASE-T2 100BASE-SX 100BASE-FX 100BASE-BX copper (twister pair) physical layer fiber physical layer Data Link Layer 5-23

Manchester encoding used in 10BaseT each bit has a transition allows clocks in sending and receiving nodes to synchronize to each other no need for a centralized, global clock among nodes! Hey, this is physical-layer stuff! Data Link Layer 5-24

Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3 Multiple access protocols 5.4 Link-layer Addressing 5.5 Ethernet 5.6 Link-layer switches, LANs, VLANs 5.7 PPP 5.8 Link virtualization: MPLS 5.9 A day in the life of a web request Data Link Layer 5-25

Hubs physical-layer ( dumb ) repeaters: bits coming in one link go out all other links at same rate all nodes connected to hub can collide with one another no frame buffering no CSMA/CD at hub: host NICs detect collisions twisted pair hub Data Link Layer 5-26

Switch link-layer device: smarter than hubs, take active role store, forward Ethernet frames examine incoming frame s MAC address, selectively forward frame to one-or-more outgoing links when frame is to be forwarded on segment, uses CSMA/CD to access segment transparent hosts are unaware of presence of switches plug-and-play, self-learning switches do not need to be configured Data Link Layer 5-27

Switch: allows multiple simultaneous transmissions A hosts have dedicated, direct connection to switch switches buffer packets Ethernet protocol used on each incoming link, but no collisions; full duplex each link is its own collision domain switching: A-to-A and B- to-b simultaneously, without collisions not possible with dumb hub C B 6 5 1 2 3 4 A B switch with six interfaces (1,2,3,4,5,6) C Data Link Layer 5-28

Switch Table Q: how does switch know that A reachable via interface 4, B reachable via interface 5? A: each switch has a switch table, each entry: (MAC address of host, interface to reach host, time stamp) looks like a routing table! Q: how are entries created, maintained in switch table? something like a routing protocol? C B 6 5 A 1 2 3 4 A B switch with six interfaces (1,2,3,4,5,6) C Data Link Layer 5-29

Switch: self-learning Source: A Dest: A A A A switch learns which hosts can be reached through which interfaces C B when frame received, switch learns location of sender: incoming LAN segment records sender/location pair in switch table B 6 1 2 3 5 4 A C MAC addr interface TTL A 1 60 Switch table (initially empty) Data Link Layer 5-30

Switch: frame filtering/forwarding When frame received: 1. record link associated with sending host 2. index switch table using MAC dest address 3. if entry found for destination then { if dest on segment from which frame arrived then drop the frame else forward the frame on interface indicated } else flood forward on all but the interface on which the frame arrived Data Link Layer 5-31

Self-learning, forwarding: example C A A A Source: A Dest: A B frame destination unknown: flood destination A location known: selective send 1 2 A 6 A 3 5 4 A A B A C MAC addr interface TTL A 1 60 A 4 60 Switch table (initially empty) Data Link Layer 5-32

Interconnecting switches switches can be connected together S 4 A B S 1 C S 2 D E F G S 3 H I Q: sending from A to G - how does S 1 know to forward frame destined to F via S 4 and S 3? A: self learning! (works exactly the same as in single-switch case!) Data Link Layer 5-33

Self-learning multi-switch example Suppose C sends frame to I, I responds to C 1 S 4 A B S 1 C S 2 D 2 E F G S 3 H I Q: show switch tables and packet forwarding in S 1, S 2, S 3, S 4 Data Link Layer 5-34

Institutional network to external network router mail server web server IP subnet Data Link Layer 5-35

Switches vs. Routers both store-andforward devices routers: network-layer devices (examine network-layer headers) switches are link-layer devices (examine linklayer headers) routers maintain routing tables, implement routing algorithms switches maintain switch tables, implement filtering, learning algorithms datagram frame application transport network link physical switch application transport network link physical link physical network link physical frame datagram frame Data Link Layer 5-36

VLANs: motivation What s wrong with this picture? Computer Science Electrical Engineering Computer Engineering What happens if: CS user moves office to EE, but wants connect to CS switch? single broadcast domain: all layer-2 broadcast traffic (ARP, DHCP) crosses entire LAN (security/privacy, efficiency issues) each lowest level switch has only few ports in use Data Link Layer 5-37

VLANs Port-based VLAN: switch ports grouped (by switch management software) so that single physical switch Virtual Local Area Network Switch(es) supporting VLAN capabilities can be configured to define multiple virtual LANS over single physical LAN infrastructure. 1 2 Electrical Engineering (VLAN ports 1-8) 7 8 9 10 15 16 Computer Science (VLAN ports 9-15) operates as multiple virtual switches 1 2 7 9 8 10 15 16 Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-16) Data Link Layer 5-38

Port-based VLAN traffic isolation: frames to/from ports 1-8 can only reach ports 1-8 can also define VLAN based on MAC addresses of endpoints, rather than switch port dynamic membership: ports can be dynamically assigned among VLANs forwarding between VLANS: done via routing (just as with separate switches) in practice vendors sell combined switches plus routers 1 2 Electrical Engineering (VLAN ports 1-8) 7 8 router 9 10 15 16 Computer Science (VLAN ports 9-15) Data Link Layer 5-39

VLANS spanning multiple switches 1 7 9 15 1 3 5 7 2 8 10 16 2 4 6 8 Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-15) Ports 2,3,5 belong to EE VLAN Ports 4,6,7,8 belong to CS VLAN trunk port: carries frames between VLANS defined over multiple physical switches frames forwarded within VLAN between switches can t be vanilla 802.1 frames (must carry VLAN ID info) 802.1q protocol adds/removed additional header fields for frames forwarded between trunk ports Data Link Layer 5-40

802.1Q VLAN frame format Type 802.1 frame 802.1Q frame 2-byte Tag Protocol Identifier (value: 81-00) Recomputed CRC Tag Control Information (12 bit VLAN ID field, 3 bit priority field like IP TOS) Data Link Layer 5-41

Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( Wi-Fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5 Principles: addressing and routing to mobile users 6.6 Mobile IP 6.7 Handling mobility in cellular networks 6.8 Mobility and higherlayer protocols 6.9 Summary Wireless, Mobile Networks 6-42

Wireless network characteristics Multiple wireless senders and receivers create additional problems (beyond multiple access): C A B C A B A s signal strength C s signal strength Hidden terminal problem B, A hear each other B, C hear each other A, C can not hear each other means A, C unaware of their interference at B space Signal attenuation: B, A hear each other B, C hear each other A, C can not hear each other interfering at B Wireless, Mobile Networks 6-43

IEEE 802.11 Wireless LAN 802.11b 2.4-5 GHz unlicensed spectrum up to 11 Mbps direct sequence spread spectrum (DSSS) in physical layer all hosts use same chipping code 802.11a 5-6 GHz range up to 54 Mbps 802.11g 2.4-5 GHz range up to 54 Mbps 802.11n: multiple antennae 2.4-5 GHz range up to 200 Mbps all use CSMA/CA for multiple access all have base-station and ad-hoc network versions Wireless, Mobile Networks 6-44

802.11 LAN architecture Internet wireless host communicates with base station base station = access point (AP) AP hub, switch or router Basic Service Set (BSS) (aka cell ) in infrastructure mode contains: BSS 1 AP wireless hosts access point (AP): base station ad hoc mode: hosts only BSS 2 Wireless, Mobile Networks 6-45

802.11: Channels, association 802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels at different frequencies AP admin chooses frequency for AP interference possible: channel can be same as that chosen by neighboring AP! host: must associate with an AP scans channels, listening for beacon frames containing AP s name (SSID) and MAC address selects AP to associate with may perform authentication [Chapter 8] will typically run DHCP to get IP address in AP s subnet Wireless, Mobile Networks 6-46

802.11: passive/active scanning BBS 1 BBS 2 BBS 1 BBS 2 AP 1 1 2 1 3 AP 2 AP 1 2 1 2 3 4 AP 2 H1 H1 Passive Scanning: (1) beacon frames sent from APs (2) association Request frame sent: H1 to selected AP (3) association Response frame sent: H1 to selected AP Active Scanning: (1) Probe Request frame broadcast from H1 (2) Probes response frame sent from APs (3) Association Request frame sent: H1 to selected AP (4) Association Response frame sent: H1 to selected AP Wireless, Mobile Networks 6-47

IEEE 802.11: multiple access avoid collisions: 2 + nodes transmitting at same time 802.11: CSMA - sense before transmitting don t collide with ongoing transmission by other node 802.11: no collision detection! difficult to receive (sense collisions) when transmitting due to weak received signals (fading) can t sense all collisions in any case: hidden terminal, fading goal: avoid collisions: CSMA/C(ollision)A(voidance) C A B C A B A s signal strength C s signal strength space Wireless, Mobile Networks 6-48

IEEE 802.11 MAC Protocol: CSMA/CA 802.11 sender 1 if sense channel idle for DIFS then transmit entire frame (no CD) 2 if sense channel busy then start random backoff time timer counts down while channel idle transmit when timer expires if no ACK, increase random backoff interval, repeat 2 802.11 receiver - if frame received OK return ACK after SIFS (ACK needed due to hidden terminal problem) DIFS sender data ACK receiver SIFS Wireless, Mobile Networks 6-49

Avoiding collisions (more) idea: allow sender to reserve channel rather than random access of data frames: avoid collisions of long data frames sender first transmits small request-to-send (RTS) packets to BS using CSMA RTSs may still collide with each other (but they re short) BS broadcasts clear-to-send CTS in response to RTS CTS heard by all nodes sender transmits data frame other stations defer transmissions avoid data frame collisions completely using small reservation packets! Wireless, Mobile Networks 6-50

Collision Avoidance: RTS-CTS exchange A RTS(A) RTS(A) AP reservation collision B RTS(B) CTS(A) CTS(A) DATA (A) defer time ACK(A) ACK(A) Wireless, Mobile Networks 6-51

802.11 frame: addressing frame control 2 2 6 6 6 2 6 0-2312 4 duration address 1 address 2 address 3 seq control address 4 payload CRC Address 1: MAC address of wireless host or AP to receive this frame Address 2: MAC address of wireless host or AP transmitting this frame Address 3: MAC address of router interface to which AP is attached Address 4: used only in ad hoc mode Wireless, Mobile Networks 6-52

802.11 frame: addressing H1 R1 router Internet AP R1 MAC addr H1 MAC addr dest. address source address 802.3 frame AP MAC addr H1 MAC addr R1 MAC addr address 1 address 2 address 3 802.11 frame Wireless, Mobile Networks 6-53

802.11 frame: more duration of reserved transmission time (RTS/CTS) frame seq # (for RDT) frame control 2 2 6 6 6 2 6 0-2312 4 duration address 1 address 2 address 3 seq control address 4 payload CRC Protocol version 2 2 4 1 1 1 1 1 1 Type Subtype To AP From AP More frag 1 1 Power Retry mgt More data WEP Rsvd frame type (RTS, CTS, ACK, data) Wireless, Mobile Networks 6-54

802.11: mobility within same subnet H1 remains in same IP subnet: IP address can remain same switch: which AP is associated with H1? self-learning (Ch. 5): switch will see frame from H1 and remember which switch port can be used to reach H1 BBS 1 AP 1 router hub or switch AP 2 H1 BBS 2 Wireless, Mobile Networks 6-55

802.11: advanced capabilities Rate Adaptation base station, mobile dynamically change transmission rate (physical layer modulation technique) as mobile moves, SNR varies QAM256 (8 Mbps) QAM16 (4 Mbps) BPSK (1 Mbps) operating point BER 10-1 10-2 10-3 10-4 10-5 10-6 10-7 10 20 30 40 SNR(dB) 1. SNR decreases, BER increase as node moves away from base station 2. When BER becomes too high, switch to lower transmission rate but with lower BER Wireless, Mobile Networks 6-56

802.11: advanced capabilities Power Management node-to-ap: I am going to sleep until next beacon frame AP knows not to transmit frames to this node node wakes up before next beacon frame beacon frame: contains list of mobiles with APto-mobile frames waiting to be sent node will stay awake if AP-to-mobile frames to be sent; otherwise sleep again until next beacon frame Wireless, Mobile Networks 6-57

802.15: personal area network less than 10 m diameter replacement for cables (mouse, keyboard, headphones) ad hoc: no infrastructure S P M P radius of coverage master/slaves: slaves request permission to send (to master) master grants requests 802.15: evolved from Bluetooth specification 2.4-2.5 GHz radio band up to 721 kbps S M S P S P P Master device Slave device Parked device (inactive) Wireless, Mobile Networks 6-58

802.16: WiMAX like 802.11 & cellular: base station model transmissions to/from base station by hosts with omnidirectional antenna base station-to-base station backhaul with pointto-point antenna unlike 802.11: range ~ 6 miles ( city rather than coffee shop ) ~14 Mbps point-to-point point-to-multipoint Wireless, Mobile Networks 6-59

802.16: WiMAX: downlink, uplink scheduling transmission frame down-link subframe: base station to node uplink subframe: node to base station pream. DL- MAP UL- MAP DL burst 1 DL burst 2 DL burst n Initial maint. request conn. SS #1 SS #2 SS #k downlink subframe uplink subframe base station tells nodes who will get to receive (DL map) and who will get to send (UL map), and when WiMAX standard provide mechanism for scheduling, but not scheduling algorithm Wireless, Mobile Networks 6-60