Department of Informatics Networks and Distributed Systems (ND) group INF 3190 Wireless Communication

Similar documents
Mobile and Sensor Systems

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Multiple Access Links and Protocols

MSIT 413: Wireless Technologies Week 8

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

MULTIPLE ACCESS PROTOCOLS 2. 1

Data Link Layer: Collisions

15-441: Computer Networking. Wireless Networking

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Wireless and Mobile Networks 7-2

Wireless Communications

Multiple Access in Cellular and Systems

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

CSC 4900 Computer Networks: Wireless Networks

CSE 461 Multiple Access. David Wetherall

Rahman 1. Application

Link Layer: Retransmissions

Data Link Layer Technologies

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

CSE 461: Wireless Networks

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CMPE 257: Wireless and Mobile Networking

ECEN 5032 Data Networks Medium Access Control Sublayer

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Wireless MACs: MACAW/802.11

Local Area Networks NETW 901

ECE 4450:427/527 - Computer Networks Spring 2017

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Mobile Communications Chapter 3 : Media Access

Chapter 12 Multiple Access 12.1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

COS 140: Foundations of Computer Science

The MAC layer in wireless networks

CMPE 257: Wireless and Mobile Networking

Wireless Local Area Networks. Networks: Wireless LANs 1

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Lecture 16: QoS and "

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

ECE 4450:427/527 - Computer Networks Spring 2017

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Aloha and slotted aloha

Logical Link Control (LLC) Medium Access Control (MAC)

CSCI-1680 Wireless Chen Avin

COS 140: Foundations of Computer Science

CSE 461: Multiple Access Networks. This Lecture

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

MAC LAYER. Murat Demirbas SUNY Buffalo

The Link Layer and LANs. Chapter 6: Link layer and LANs

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Last Lecture: Data Link Layer

Wireless Networking: An Introduction. Hongwei Zhang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

CS 332 Computer Networks Wireless Networks

CS4516 Advanced Computer Networks. Final Review

Medium Access Control Sublayer Chapter 4

Chapter 6 Wireless and Mobile Networks

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

The MAC layer in wireless networks

Wireless LAN. Access Point. Provides network connectivity over wireless media

Redes de Computadores. Medium Access Control

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Data Communications. Data Link Layer Protocols Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Advanced Computer Networks WLAN

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CSE 6811 Ashikur Rahman

EC Wireless Networks VIII - Semester Questions Bank

EE 122: Ethernet and

Computer Networks. Wireless LANs

Mohammad Hossein Manshaei 1393

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Multiple Access Links and Protocols

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Wireless LANs. ITS 413 Internet Technologies and Applications

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Chapter 1 Basic concepts of wireless data networks (cont d)

M06:Wireless and Mobile Networks. Corinna Schmitt

COMP 3331/9331: Computer Networks and Applications

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Reading. Read 3 MPLS links on the class website

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Architectures of Next Generation Wireless Networks. Pascal LORENZ.

Mohammad Hossein Manshaei 1393

Chapter 5: Link layer

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Transcription:

Department of Informatics Networks and Distributed Systems (ND) group INF 3190 Wireless Communication Michael Welzl

Not exactly a minor side topic Cellular Networks (3G/4G/LTE), WLAN, WPAN, WMAN, Software- Defined / Cognitive Radios, Smart Antennas / MIMO Systems, Adhoc Wireless Networks, Wireless Mesh Networks, Wireless Sensor Networks, Vehicular Networks, Satellites (GEOs, LEOs, MEOs),. and usage scenarios! Context-Aware Services, Ubiquitous Computing, Smart Spaces, Delay-Tolerant Networking, and issues! Cross-layering (e.g. TCP-over-X ), efficient routing, energy saving, Hence, can only provide: Some technical foundations that are common to many systems above Translates into: layers 1-2 We ll focus on layer 2 A brief overview of some examples 2

Technical foundations and WLANs 3

Channel Access: Frequency Hopping Spread Spectrum (FHSS) Signal broadcast over seemingly random series of frequencies Receiver hops between frequencies in sync with transmitter Eavesdroppers hear unintelligible blips Jamming on one frequency affects only a few bits Rate of hopping versus Symbol rate Fast Frequency Hopping: One bit transmitted in multiple hops. Slow Frequency Hopping: Multiple bits are transmitted in a hopping period Adaptive variant (trying to avoid bad frequencies) used in Bluetooth (79 channels, 1600 hops/s) 4

Multiplexing (MUX) Transmission of several data flows (logical connections) over one medium Realize individual connections, normally with deterministic properties (throughput, delay) Terminology:??M (.. Multiplexing ) or??ma (.. Multiple Access ) Also: Transmission of one data flow (logical connection) over several media (increase performance and/or reliability) High Performance Connection several connections with less performance / quality 5

Frequency Division Multiplexing (FDM(A)) (a) The original bandwidths. (b) The bandwidths raised in frequency. (b) The multiplexed channel. Consider: radio FDM in optical domain: Wavelength Division Multiplexing (WDM) FDM with orthogonal signals, allwing closer placement of frequencies: OFDM 6

Time Division Multiplexing (TDM(A)) Time slots used to differentiate between data flows can only be used for digital data synchronization required; typically: signaling bit(s) throughput not always deterministic (statistical TDM) TDM formed the basis for ATM Connection oriented behavior emulated via forwarding ( switching ) of fixed-size cells Realized Virtual Paths containing Virtual Channels with various QoS guarantees Not wireless at all (fiber required), but 802.16 (wimax) provides similar QoS services and ATM compatibility 7

8 Space Division Multiplexing (SDM(A)) Wired transmission: multiple cables Wireless transmission: reuse of (bunches of) frequencies already used in First-Generation (analog) Advanced Mobile Phone System (AMPS) 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 Cluster Cell Cluster size (No. of cells) k, cell radius r, distance d between base stations sharing the same frequencies: d = r 3k

Example: Global System for Mobile Communications (GSM) Second Generation (digital voice) Cell phone transmits on freq. X, receives on freq. X+55 MHz uses: FDM + TDM (frame hierarchy) US counterpart: Digital Advanced Mobile Phone System (D-AMPS) 9

Code Division Multiplexing (CDM(A)) Simultaneous transmission using a single frequency! Method explained below is called Direct-Sequence Spread Spectrum (DSSS) Signal in bipolar notation: 1 1, 0-1 Multiply with individual chip sequence Sequence length = duration of one symbol (1 bit consists of n chips) Chip sequences are orthogonal: seq. 1: x = (x 1, x 2,.. x n ), seq. 2: y = (y 1, y 2,.. y n ) x i y i = 0 ensures reconstructability! Common choice: Walsh sequence - line of Walsh-Hadamard matrix: H 1 = [1] [ H n = H n/2 H n/2 H n/2 -H n/2 ] n i=1 Reconstruction: multiply overlapping signals with chip sequence + integrate 10

1-1 CDMA Example Sender 1 Sender 2 1 0 1 1 0 1 1 0 Original signals From H 2 : 1,1 1,-1 1-1 Chip sequences 1-1 2 1 0-1 -2 After multiplication Transmitted (overlapped) signal 1-1 Chip sequences 2 1 0-1 -2 1-1 After multiplication After integration Receiver 1 Receiver 2 11

CDMA properties Example: 1 signal with 2 symbols 2 signals with 3 symbols Transmission of chips: higher data rate than bits! more bandwidth required - thus, spread spectrum technology Reconstruction requires tight synchronization Used within GPS Proposal by Ericsson: Wideband CDMA (W-CDMA) 5 MHz bandwidth designed to interwork with GSM networks (not downward compatible, phone can move from GSM to W-CDMA without losing call) used within Universal Mobile Telecommunications System (UMTS) 12

Multiplexing vs. Multiple Access Control (MUX vs. MAC) Multiplexing multiple processes per wire map connections onto connections long-distance trunk wire Multiple Access (MA): usually, equals media access : multiple stations per cable / per wireless cell 1. centralized: e.g., host à terminal controllers, master/slave (outdated) 2. decentralized: a) concurrent: simpler, good for wireless, few guarantees b) controlled: next sender elected unambiguously 13

MA: Aloha History: wireless wired wireless :) Hawaii 70 s collisions resolved via timeout (base station supposed to ack) station A 1.1 1.2 1.3 transmission time station B 2.1 2.2 transmissions station C 3.1 3.2 base station 1.1 2.1 3.2 time reception collision partial collision Variant: slotted Aloha fixed time slots, fixed size frames - no partial collisions 14

Carrier Sense Multiple Access (CSMA) Listen (CS) Before Talk (LBT): channel idle: transmit entire frame channel busy: defer transmission 1-Persistent CSMA: retry immediately when channel becomes idle P-Persistent CSMA: retry immediately with probability p when channel becomes idle Non-persistent CSMA: retry after random interval Human analogy: don t interrupt others! Politicians are sometimes 1-Persistent What happens if two senders do this? Collisions sender 1 may not immediately see 2 s transmission (propagation delay) entire frame transmision time wasted 15

Persistent and Nonpersistent CSMA Comparison of channel utilization versus load for various random access protocols. 16

CSMA/CD (Collision Detection): wired only CD: signal sent = signal on wire? must Listen While Talking (LWT), requires minimum message size Colliding transmissions aborted reducing channel wastage Retry: binary exponential backoff Doesn t work in wireless a radio can usually not transmit and receive at the same time signal strength decreases proportionally to the square of the distance or even more; not every radio signal is equally strong sender might not hear the collision, i.e., CD does not work, e.g. if a terminal is hidden (to be explained) 17

802.11 DCF: CSMA/CA (Collision Avoidance) Uses a CW: Contention Window ( dangerous time after busy) IFS: interframe spacing (3 sub-intervals for short/prio/data msgs.) if ready to send, station draws random η from [0,1] computes No. of Slots n to wait when medium available: n = IFS + η CW decreases n as slots pass by, n=0: transmit! if other station precedes (recognized via LBT): keep old n (already decreased)! ready to send t 0 Medium busy Slots IFS η CW CW frame sent data time 18

CSMA/CA (2) Contention Window small: greater chance of collision, but high throughput when small load large: smaller chance of collision, but less throughput CSMA/CA reduces chance of collision, but cannot prevent it Exponential backoff: CW duplicated in response to error Collision detected via acknowledgement Receiver sends ACK when frame arrives (sender timeout = error) ACK has high priority (smaller IFS), but can also collide 19

Hidden and Exposed Terminal problems Hidden Terminal problem: A and C send to B. They only see B, but B sees A and C; at B, A s traffic can collide with C s traffic. A B C Exposed Terminal problem: B wants to send to A and C wants to send to D; one of them must unnecessarily (!) wait because traffic collides between B and C only. A B C D Optional fix for both (but overhead): Request to Send (RTS) / Clear to Send (CTS) frames 20

802.11 Rate Adaptation Wireless channel characteristics: noise, interference, fading, shortterm variation in channel condition (bursty bit errors) Lower PHY transmission rate => more robust to noise 802.11b: 1 11 Mbit/s (4 PHY rates) 802.11g: 6 54 Mbit/s (8 PHY rates) Rate Adaptation (RA) method left to the vendor; various schemes exist based on PHY (e.g. SNR or Received Signal Strength Indication (RSSI)) or link layer metrics Common: Auto-Rate Fallback (ARF) and derivatives: assumes that consecutive packet loss = probably not due to collision 21

802.11n Features A B C D MIMO Because signals Sender Receiver A=>C, A=>D, B=>C, B=>D will be phase shifted, cumulative signal can be de-multiplexed at the receiver Frame aggregation Consider e.g. only one sender transmitting 3 frames in a row: contention period between frames is a waste of time Better to transfer them as a single superframe (but limited in max size for fairness reasons) ( Block ) ACKs sent in between blocks of the superframe 22

Mobility IP address = host identifier AND location address changes: identifier changes => e.g. TCP connections are interrupted connections should persist when users move...no problem within (W)LAN, but what if user moves from LAN 1 to LAN 2? what if a user wants to run a server? Solution: Mobile IP mobile host (MH): address does not change corresponding host (CH): wants to contact MH home agent (HA): represents MH when MH not in home network always knows location of HA! foreign agent (FA): in visiting network, forwards incoming packets to MH MH CH FA HA Visiting Network Internet Home Network 23

Mobility /2 Two relevant addresses per MH: Home address: permanent MH address, belongs to home subnet Care-of-address: used by MH in visiting network - two types: Foreign-Agent-Care-of-Address: FA forwards incoming packets to MH; several MH s can share the same address (not used in IPv6) Collocated-Care-of-Address: assigned to MH in visiting network - no FA! address must be different for each MH in visiting network Operation: Agent Discovery: passive (agent advertisement msgs from HA / FA) or active (agent solicitations query for advertisements) detection of HA or FA Registration: MH sends care-of-address to HA + registers (request-reply); HA keeps table of home address - care-of-address entries can reach MH Tunneling: data flow: CA HA FA MH CA tunnel source = home address! 24

Network coding Based on linear combinations of orthogonal vectors in finite fields Easier to explain with XOR Various applications; in wireless, exploits overhearing Example - goal: A => C and C => A A B C A, C: hosts B: base station Without NC: 1. A => B 2. B => C (A hears this) 3. C => B 4. B => A (C hears this) With NC: 1. A => B 2. C => B 3. B broadcasts A s msg. XOR C s msg. 25

Is Network Coding practical? Major performance and reliability gains claimed... but: significant overhead Storage and CPU Decoding: Inverting m x m-matrix (m = size of variable vector) this needs time O(m 3 ) and memory O(m 2 ) Need to consider interactions with e.g. MAC, rate adaptation, Example deployment in a wireless mesh network showed significant benefits Note: more efficient (and more complex) codes exist for end-to-end usage scenarios (e.g. Raptor code, used in 3GPP MBMS) 26

Some examples 27

UMTS and all that (2G, 2.5G, 3G, 4G) Third Generation Mobile Phones: Digital Voice and Data ITU-Standard International Mobile Telecommunications (IMT-2000): High-quality voice transmission Messaging (replace email, fax, SMS, chat, etc.) Multimedia (music, videos, films, TV, etc.) Internet access (web surfing + multimedia) Single worldwide technology envisioned by ITU, but: Europe: GSM-based UMTS US: IS-95 based CDMA2000 (different chip rate, frame time, spectrum,..) Intermediate solutions (2.5G): Enhanced Data rates for GSM Evolution (EDGE): GSM with more bits per baud General Packet Radio Service (GPRS): packet network over D-AMPS or GSM Now there s also 4G, based on the Open Wireless Architecture (OWA) 3GPP Long Term Evolution (LTE) is based on GSM/EDGE and UMTS/HSPA; sometimes called 3.9G because it doesn t satisfy 4G requirements. LTE Advanced does 28

WiMAX (802.16) MAN technology, but frequencies auctioned off country wide in many cases => eliminates main business case? Connection oriented QoS per connection; all services applied to connections managed by mapping connections to service flows bandwidth requested via signaling Three management connections per direction, per station basic connection: short, time-critical MAC / RLC messages primary management connection: longer, delay-tolerant messages authentication, connection setup secondary management connection: e.g. DHCP, SNMP Transport connections unidirectional; different parameters per direction Convergence sublayers map connections to upper technology two sublayers defined: ATM and packet (Ethernet, VLAN, IP,..) 29

Mobile Ad Hoc Networks (MANETs) Mobile devices, also acting as routers Memory and CPU restrictions Flexible environment, changing topology Proactive routing continuously make routing decisions numerous efforts - examples: DBF, DSDV, WRP,.. Reactive routing determine routes when needed numerous efforts - examples: TORA, DSR, ABR, RDMAR, AODV,.. 30

Example: Ad hoc On-Demand Distance Vector (AODV) algorithm - route discovery (a) Range of A's broadcast. (b) After B and D have received A's broadcast. (c) After C, F, and G have received A's broadcast. (d) After E, H, and I have received A's broadcast. Shaded nodes are new recipients. Arrows show possible reverse routes. 31

From MANETs to WMN MANET used to be a hype, is now a cold topic Not too many realistic usage scenarios When do you not have a base station but want to connect anyway? Military battlefield was a common example scenario is it the only real use case? For anything else, what s the user incentive for type of net? Better to incorporate base stations and consider the (somewhat less mobile) network formed by the heterogeneous equipment connected in this way Wireless Mesh Network (WMN) 32

and DTN Real ad hoc situations are often intermittent We meet in the hallway and talk for 5 minutes You then meet a common friend 2 hours later There will never be e.g. a TCP connection between me and this friend but your device could still carry my packets, like you could deliver a letter for me? DTN was originally Interplanetary Internet intermittent connectivity inherent, e.g. moon not always visible On earth, DTN has been proposed for rural connectivity (the bus or a motorcycle carry packets) - e.g. KioskNet: http://blizzard.cs.uwaterloo.ca/tetherless/index.php/kiosknet 33

Cognitive Radio Spectrum utilization depends strongly on time and place Could do better than always use the same allocated frequencies Idea: let unlicensed ( secondary ) users access licensed bands without interfering with licensed ( primary ) users Ideally, access a database which maintains a common view of who uses which spectrum Many issues (e.g. security, incentives for cooperating,..) 34

Wireless Sensor Networks (WSNs) Based on 802.15.4 Some devices: ZigBee (802.15.4 PHY+MAC + layers 3 / 7 ) uses CSMA/CA Many devices can run TinyOS or Contiki OSes Specific scenarios alarm based systems, regular measurements,... => specific improvements possible e.g. static topology, regular updates: can do special routing; can put nodes to sleep when they don t communicate transport: sometimes per-hop reliability often: one static sink => funneling effect of traffic going up the tree, earlier battery depletion of nodes near the sink Solution: mobile sink (e.g. radio controlled helicopter) 35