Announcements. Lecture 2: Wireless Networking Challenges. Motivation: Many many Network Components. Schedule for Today. Page 1

Similar documents
Schedule for Today : Wireless Networks Lecture 2: Wireless Networking Challenges. Motivation: Many many Network Components. What is a Protocol

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture

Outline / Wireless Networks and Applications Lecture 1: Course Organization and Overview. Goals of the Course. Lectures.

Lecture 3 Protocol Stacks and Layering

416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018

Page # Last Time. Lecture 2 Protocol Stacks and Layering. Today s Lecture. Why protocols and layering? What is a Protocol.

Lecture 2 Protocol Stacks. Last Tuesday

15-441: Computer Networking. Wireless Networking

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Network Simulators, Emulators and Testbeds

CS 640: Introduction to Computer Networks. Today s Lecture. Page 1

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Outline / Wireless Networks and Applications Lecture 1: Course Organization and Overview. Goals of the Course. Lectures.

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007)

Introduction to Networks

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

ECE 4450:427/527 - Computer Networks Spring 2017

Mobile and Sensor Systems

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

ECE 650 Systems Programming & Engineering. Spring 2018

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Last Lecture: Data Link Layer

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

CEN 538 Wireless LAN & MAN Networks

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

Wireless Security Background

Local Area Networks NETW 901

Overview of Networks

CS61C : Machine Structures

Introduction to computer networking

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Mohammad Hossein Manshaei 1393

Announcements: ECE/CS 372 introduction to computer networks. Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Communication Networks

Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

Links. CS125 - mylinks 1 1/22/14

Medium Access Control

Network Connectivity and Mobility

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.

CS 428/528 Computer Networks Lecture 01. Yan Wang

Lecture 15 Networking Fundamentals. Today s Plan

Computer Communication Networks

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

2. A collection of interconnected networks is called an internetwork. 3. Each machine is connected to a central hub with a point-to-point connection.

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless

CSC 4900 Computer Networks: Wireless Networks

IT4405 Computer Networks (Compulsory)

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Announcements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani:

ITEC 3800 Data Communication and Network. Introducing Networks

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

CSE 123A Computer Networks

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Lecture 2: Internet Architecture

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Chapter 6 Wireless and Mobile Networks

Principles behind data link layer services:

Principles behind data link layer services:

CS3600 SYSTEMS AND NETWORKS

Network protocols and. network systems INTRODUCTION CHAPTER

Computer and Network Security

Principles behind data link layer services

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Chapter 16 Networking

1: Review Of Semester Provide an overview of encapsulation.

CSCI Computer Networks

end systems, access networks, links 1.3 network core

Computer Communications DIT 420 EDA343

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

CCNA Exploration1 Chapter 7: OSI Data Link Layer

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

CS61C : Machine Structures

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Networking interview questions

Network Connectivity and Mobility Part 2

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Chapter 1: Introduction

MAC LAYER. Murat Demirbas SUNY Buffalo

Wireless Communication and Networking CMPT 371

Networking Applications

Transcription:

Announcements 18-759: Wireless Networks Lecture 2: Wireless Networking Challenges Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2009 http://www.cs.cmu.edu/~prs/wirelesss10/ Peter A. Steenkiste 1 Good news: no more waiting list! Results of survey Networking Yes No Wireless Comm Yes Most popular topics: ad hoc, QoS, mesh, network coding Next: spectrum access, vehicular, DTN, opportunistic communication Least popular: management & planning, selftuning, Peter A. Steenkiste 2 18 3 No 6 0 Schedule for Today Motivation: Many many Network Components The OSI model Challenges in Wireless Networking Evaluation techniques Wireless emulator Operating System Links Router Software (many protocols) Operating System Computer Protocol Software Router Hardware Network Interface Bridge HW/SW Computer Peter A. Steenkiste 3 Peter A. Steenkiste 44 Page 1

How Do We Design a Network? Need to deal with» Complexity» Many parties involved» Very long life time Key is modularity» Natural solution to deal with complexity» Independent parties can develop components that will interoperate» Different pieces of the system can evolve independently, at a different pace Need well-defined interfaces Peter A. Steenkiste 55 An agreement between parties on how communication should take place. Protocols may have to define many aspects of the communication. Syntax:» Data encoding, language, etc. Semantics:» Error handling, termination, ordering of requests, etc. Protocols at hardware, software, all levels! Example: Buying airline ticket by typing. Syntax: English, ascii, lines delimited by \n What is a Protocol Friendly greeting Muttered reply Destination? Pittsburgh Thank you Peter A. Steenkiste 66 Are Protocols All We need? Let Us Try Again TCP IP Node 2 Two or more hosts talk over a wire Hosts talk in a homogeneous network (administratively, technology) Hosts talk across heterogeneous networks We run some applications over that UDP HTTP Node 1 Node 3 Peter A. Steenkiste 77 Peter A. Steenkiste 88 Page 2

Protocol and Service Levels Interfaces Inter-network Core Networks Can further split up the layers: : generic versus application-specific functionality Core: wires versus data delivery Peter A. Steenkiste 9 9 Each protocol offers an interface to its users, and expects one from the layers on which it builds» Syntax and semantics strike again Data formats Interface characteristics, e.g. IP service model Protocols build upon each other» Add value E.g., a reliable protocol running on top of IP» Reuse E.g., OS provides TCP, so apps don t have to rewrite Peter A. Steenkiste 101 7 6 5 4 Networking 101 Layer Network Model The Open Systems Interconnection (OSI) Model. Presentation Session Transport 3 Network Network 2 1 Data link Physical Data link Physical Presentation Session Transport Network Data link Physical OSI Motivation Standard approach of breaking up a system in a set of components, but the components are organized as a set of layers.» Only horizontal and vertical communication» Components/layers can be implemented and modified in isolation Each layer offers a service to the higher layer, using the services of the lower layer. Peer layers on different systems communicate via a protocol.» higher level protocols (e.g. TCP/IP, Appletalk) can run on multiple lower layers» multiple higher level protocols can share a single physical network Peter A. Steenkiste 11 Peter A. Steenkiste 12 Page 3

OSI Functions Example: Sending a Web Page (1) Physical: transmission of a bit stream. (2) Data link: flow control, framing, error detection. (3) Network: switching and routing. (4) Transport: reliable end to end delivery. (5) Session: managing logical connections. (6) Presentation: ti data transformations. ti (7) : specific uses, e.g. mail, file transfer, telnet, network management. Http hdr TCP header Web page payload... Presentation Session Transport Network Data link Physical Peter A. Steenkiste 13 Peter A. Steenkiste 14 A TCP / IP / 802.11 Packet Multiplexing and Demultiplexing Preamble MAC header Presentation LLC / SNAP header Session IP header Transport Network TCP header Data link Physical Data Peter A. Steenkiste 15 There may be multiple implementations of each layer.» How does the receiver know what version of a layer to use? Each header includes a demultiplexing field that is used to identify the next layer.» Filled in by the sender» Used by the receiver Multiplexing occurs at multiple layers.» E.g., IP, TCP, TCP IP TCP IP V/HL TOS Length ID Flags/Offset TTL Prot. H. Checksum Source IP address Destination IP address Options.. Peter A. Steenkiste 161 Page 4

Benefits of Layered Architecture The IP Hourglass Significantly reduces the complexity of maintaining the system.» Effort is 7 x N instead of N 7 for N versions per layer The implementation of a layer can be replaced easily as long as its interfaces are respected» Does not impact the other components in the system» Different implementation versus different protocols In practice: most significant ifi evolution and diversity at the top and bottom:» s: web, peer-to-peer, video streaming,..» Physical layers: optical, wireless, new types of copper True For Wireless? Peter A. Steenkiste 17 http://www.iab.org/docume nts/docs/hourglass-londonietf.pdf Peter A. Steenkiste 18 Physical Layer Overview Schedule for Today Optical fiber: very high bandwidth but relatively expensive» Multi-mode fiber for campus deployments» Single-mode fiber for long distances Copper wires: good performance for shorter distances» Coax has high capacity but bulky and expensive» Twisted pair is cheap but has lower capacity Wireless: lowest capacity, very diverse, most difficult technology» Performance of a wireless link is determined by the physical world (buildings, object, people, other RF, )» Inter-planetary.. satellite.. WAN.. MAN.. LAN.. PAN» Capacity can be increased but gets expensive The OSI model Challenges in Wireless Networking Evaluation techniques Wireless emulator Peter A. Steenkiste 19 Peter A. Steenkiste 20 Page 5

Why Use Wireless? There are no wires! Has several significant advantages: No need to install and maintain wires» Reduces cost important in offices, hotels,» Simplifies deployment important in homes, hotspots, Supports mobile users» Move around office, campus, city, - users get hooked» Remote control devices (TV, garage door,..)» Cordless phones, cell phones,..» WiFi, GPRS, WiMax, What is Hard about Wireless? There are no wires! In wired networks links are constant, reliable and physically isolated In wireless networks links are variable, errorprone and share the ether with each other and other external, uncontrolled sources Peter A. Steenkiste 21 Peter A. Steenkiste 22 Attenuation and Errors Throughput vs. distance (WiMAX) Hans Inge In wired networks error rate 10^(-10) Wireless networks are far from that target Signal attenuates with distance and is affected by noise Probability of a successful reception depends on SINR = S/I+N Modulation and coding schemes introduce redundancy to allow for decoding http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04526126 Peter A. Steenkiste 23 Peter A. Steenkiste 24 Page 6

The Adversity of the Wireless Medium Wireless is a shared medium Previous hold for line of sight transmissions In the presence of reflectors signal may experience multipath fading» Slow fading when a large obstruction such as a hill or a large building obscures the main signal path» Fast fading that could be taken advantage of using error correcting codes and time diversity Very hard to predict what the signal strength will be at a given location models exist for indoors and outdoors spaces (PHY lectures) Transmitters broadcast Devices can operate either in transmit or receive mode How do you coordinate access to the medium? Hans Inge Peter A. Steenkiste 25 Peter A. Steenkiste 26 Interference Medium Access Control Noise is naturally present in the environment from many sources. Interference can be from other users or from malicious sources. Hans Inge Different transmitters/receivers use:» Different frequencies (FDMA Frequency Division Multiple Access)» Different time slots (TDMA Time Division Multiple Access)» Different codes (CDMA Code Division Multiple Access)» Randomly access the medium (CSMA/CA Carrier Sense Multiple Access/Collision Avoidance) Impacts the throughput users can achieve. Main goal: avoid collisions while making efficient use of the medium Jurg Peter A. Steenkiste 27 Peter A. Steenkiste 28 Page 7

Wireless Losses How Do We Increase Network Capacity? Can be due to:» Signal errors that lead to a packet that cannot be decoded» OR» Corruption of the transmitted information due to collisions, SINR=S/(N+I) too low Understanding the reason behind a loss requires cross-layer information.» Is it PHY?» Or MAC-related? Information required by more than one layers. Easy to do in wired networks: simply add wires.» Fiber is especially attractive Adding wireless links increases interference.» Frequency reuse can help subject to spatial limitations» Or use different frequencies subject to frequency limitations it ti The capacity of the wireless network is fundamentally limited. Hans Inge Peter A. Steenkiste 29 Peter A. Steenkiste 30 Cellular architecture Deployment comprising cells Challenge to provide consistent service even at the edge of the cell be able to deal with intensity given the capacity of the cell WiFi architecture Could be chaotic or managed Limited spectrum service guarantees hard to make Channel assignment, power control Peter A. Steenkiste 31 Peter A. Steenkiste 32 Page 8

Mobility Affects the Link Throughput Mobility is an Issue even for Stationary Users Quality of the transmission depends on distance and other factors.» Covered later in the course Hans Mobile people p and devices affect the transmission channel of stationary nodes. Hans Affects the throughput mobile users achieve. Worst case is periods with no connectivity! Inge Inge Peter A. Steenkiste 33 Jurg Peter A. Steenkiste 34 And It Gets Worse Standardization and Technology The impact of mobility on transmission can be complex. Mobility also affects addressing and routing. Hans Too many standards a PCS IS-136 device won t work in an area with PCS IS-95 Too many radios» Radio co-existence is an issue» Use cases hard to determine which radio to use where (cost, bandwidth, power consumption) Device limitations impose solutions» Small screen Inge Peter A. Steenkiste 35 Peter A. Steenkiste 36 Page 9

Back to the s How Well Does the Layered Architecture Work for Wireless? WiFi applications:» GoogleWifi: provide sufficient coverage given that installation is on light posts ensure adequate quality» Meraki: ensure mesh works and there is enough coverage to connect more customers at appropriate levels of quality» Developing regions: Make WiFi work across links that cover Kms changes in the MAC» Home security: Ensure that interference will not adversely impact readings» Vehicle-to-vehicle: deal with fast moving vehicles, ensure that information is propagated to the relevant region Key challenges tend to be different for various application domains, but almost all challenges must be considered everywhere Peter A. Steenkiste 37 Works pretty well:» We all use WiFi and it usually works well» Our cell phones usually work But getting it to work is a lot more work than for a wired network! And a lot of solutions are kind of ugly! Some example Peter A. Steenkiste 38 Examples Schedule for Today How do you multiplex at the physical layer?» Not an issue for wired communication! Physical layer solutions to deal with signal propagation challenges» Use of redundancy, rate adaptation, dealing with multipath, etc. MAC layer solutions to deal with challenges» ACKs and retransmissions, i hidden terminals, etc. Higher layer challenges» TCP congestion control issues, highly variable bandwidth links, dealing with disconnected operation» IP address used by applications as an identifier The OSI model Challenges in Wireless Networking Evaluation techniques Wireless emulator Peter A. Steenkiste 39 Peter A. Steenkiste 40 Page 10

Evaluation: Challenges and Tradeoffs Wireless testbeds are hard to manage» Interference, production networks, control node movement,.. Wireless network research has largely been simulation based» Questionable accuracy» Difficult to evaluate real hardware and applications Simulator Control & Repeatability Emulator Emulator provides an attractive middle ground between simulation and testbeds Testbed Realism Peter A. Steenkiste 41 Simulation Commercial and publicly available products Ns-2 the most popular network simulator http://www.isi.edu/nsnam/ns/» But ns3 is gaining in popularity Wireless extensions cover a wide range of effects:» Better propagation models (http://www.ece.cmu.edu/wireless/welcome.html) cmu edu/wireless/welcome html)» Mobility (http://www.monarch.cs.rice.edu/cmu-ns.html) Commercial products are OPNET and Globosim» Main benefit very rigorous propagation models, can deal with larger networks, more realistic Peter A. Steenkiste 42 Wireless Testbeds A number of testbeds are now available over the Internet Orbit at Rutgers: indoor grid of 200 nodes in a big room» Good for certain classes of experiments In the wild deployment examples:» Emulab in Utah: indoor, WiFi like deployment» Outdoor Orbit» Homenet at CMU» MAP at Purdue» Etc. Peter A. Steenkiste 43 Traditional Testbed Limitations Signal Propagation Environment Distributed uncontrolled signal propagation environment Controlled but highly-constrained signal propagation environment Can be extremely cumbersome to work with! Peter A. Steenkiste 44 Page 11

Schedule for Today Emulator Architecture The OSI model Challenges in Wireless Networking Evaluation techniques Wireless emulator Peter A. Steenkiste 45 Peter A. Steenkiste 46 Physical Layer Emulation Why Better than Simulation? Reality s Simulation Physical Emulation Signal Propagation Environment OS Networking Stack Networking Stack ~ Key idea:» Virtualize signal propagation environment» Highly controlled and extremely flexible signal propagation environment Peter A. Steenkiste 47 Host Device MAC Firmware Wireless Device PHY Antenna Signal Propagation Peter A. Steenkiste 48 ~ Gives Control Page 12

Simple Mobility Experiment Observed Signal Strength Typical Noise floor Peter A. Steenkiste 49 Peter A. Steenkiste 50 Running Wireless Experiments Runs wireless mobile experiments remotely!» Devices are rack mounted in machine room» Experiment is done by controlling the emulated channels (on FPGA) and the laptops Three ways of defining and controlling experiments:» GUI based» Script-based: simple sequence of commands» Java-based: full control You at home, in dorm, etc. Internet Peter A. Steenkiste 51 Overview of Emulator Experiments Range of wireless channels:» Traces: replay the real world (approximately)» Statistical models: real world behavior (on average)» Artificial models: to isolate specific effects Different types of experiments:» Understanding wireless network behavior» Characterization of channel, device properties» Comparing performance of different protocols» Testing and debugging prototypes t» Interoperability and standards compliance testing Challenges:» Realistic traffic models and mobility patterns» Extracting meaning for larger scale» Understanding impact of heterogeneity Peter A. Steenkiste 52 Page 13

What is Next? No class on Monday y( (MLK) Wireless physical layer lectures start on Wednesday January 20 th. Peter A. Steenkiste 53 Page 14