The Basics of Wireless Communication Octav Chipara

Similar documents
Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5

Dynamic Source Routing (DSR) [Johnson96]

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Local Area Networks NETW 901

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Wireless Networking & Mobile Computing

CSE/EE 461 Section 2

SENSOR-MAC CASE STUDY

CS 268: Computer Networking. Taking Advantage of Broadcast

15-441: Computer Networking. Wireless Networking

CSE 461: Wireless Networks

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?

Routing in Ad-hoc Networks

CMPE 257: Wireless and Mobile Networking

MAC protocols. Lecturer: Dmitri A. Moltchanov

Mohamed Khedr.

CMPE 257: Wireless and Mobile Networking

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA. TCP over noisy links. Link layer challenges. Wireless deployments

Mobile Communications. Ad-hoc and Mesh Networks

Unicast Routing in Mobile Ad Hoc Networks

CS551 Ad-hoc Routing

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Admission Control in Time-Slotted Multihop Mobile Networks

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

CE693: Adv. Computer Networking

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Subject: Adhoc Networks

Mobile Ad-Hoc Networks & Routing Algorithms

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols

LECTURE 9. Ad hoc Networks and Routing

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Wireless Protocols. Training materials for wireless trainers

Page 1. EEC173B/ECS152C, Winter Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

ECE/CSC 570 Section 001. Final test. December 11, 2006

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Ad Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Multiple Access Protocols

4/11/2012. Outline. Routing Protocols for Ad Hoc Networks. Classification of Unicast Ad-Hoc Routing Protocols. Ad Hoc Networks.

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Ad hoc On-demand Distance Vector Routing (AODV) [Perkins99] CSE 6811 : Lecture 7

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging)

ECE 158A: Lecture 13. Fall 2015

AODV Route Requests (RREQ) are forwarded in a manner similar to DSR

Ad Hoc Networks: Issues and Routing

Wireless Mesh Networks

Nomadic Communications. Copyright. Ad-Hoc and WMN. Wireless Mesh Networks. Quest operaèprotettadallalicenza:

Power aware Multi-path Routing Protocol for MANETS

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Announcements. CS 5565 Network Architecture and Protocols. Ethernet. Ethernet. Ethernet Model. Ideal Multiple Access Protocol

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Lecture 16: QoS and "

MAC LAYER. Murat Demirbas SUNY Buffalo

Wireless LANs. ITS 413 Internet Technologies and Applications

Energy Efficient EE-DSR Protocol for MANET

IEEE s ESS Mesh Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Medium Access Control

Telecommunication Protocols Laboratory Course. Lecture 3

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

Virtual University of Pakistan. Describe the Hidden Node and Exposed Node problems in Standard? VUSR. [Larry L. Peterson]

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

2013, IJARCSSE All Rights Reserved Page 85

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

Ad Hoc Networks. Mobile Communication Networks (RCSE) Winter Semester 2012/13. Integrated Communication Systems Group Ilmenau University of Technology

AODV-PA: AODV with Path Accumulation

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

MAC protocols for ad hoc networks

Performance Evaluation of AODV and DSR routing protocols in MANET

Ad Hoc Networks: Introduction

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

ECSE 414 Fall 2014 Final Exam Solutions

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Network service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to.

IEEE Medium Access Control. Medium Access Control

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)

Sensor Network Protocols

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

ECS-087: Mobile Computing

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Last Lecture: Data Link Layer

Transcription:

The asics of Wireless ommunication Octav hipara

genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2

hannel models hannel models - document assumptions of wireless properties the basis upon which we build and analyze network protocols good model is one that is simple - reason effectively about the properties of protocols accurate - capture prevalent properties of wireless channels these requirements are often conflicting Must provide insight into fundamental problems media access routing congestion Today, simple channel model..., next lecture more realistic models 3

Protocol model Network is modeled as a graph vertices - all nodes in a graph edges - connect nodes that may communicate Properties: captures connectivity information packet collisions (collisions happen only at the receiver) radios are half-duplex 4

Protocol model Network is modeled as a graph vertices - all nodes in a graph edges - connect nodes that may communicate Properties: captures connectivity information packet collisions (collisions happen only at the receiver) radios are half-duplex 4

Protocol model Network is modeled as a graph vertices - all nodes in a graph edges - connect nodes that may communicate Properties: captures connectivity information packet collisions (collisions happen only at the receiver) radios are half-duplex 4

Media ccess and ontrol (M) Problem: multiple nodes want to transmit concurrently nodes transmitting concurrently packet collisions Metrics for characterizing M performance throughput - number of packets delivered per second latency - time to deliver a packet energy efficiency - energy consumed for tx and rx fairness - each node gets its fair share of the channel flexibility - how does the M handle changes in workload pproaches SM - arrier Sense Multiple ccess TM - Time ivision Multiple ccess 5

SM SM - arrier Sense Multiple ccess pproach: 1: node will attempt to transmit after a random delay t W 2: check if channel is available free perform packet transmission busy W = W * 2, go to step 1 Notes: nodes operate independently! the underlying performance is highly dependent on selecting W W - reflects the expected number of contenders for the channel W increases exponentially [the rate depends on protocol] assumption: the sender can accurately check if channel is free/busy usually holds because: receiver sensibility << channel quality required for communication 6

SM SM - arrier Sense Multiple ccess pproach: 1: node will attempt to transmit after a random delay t W 2: check if channel is available free perform packet transmission busy W = W * 2, go to step 1 Notes: nodes operate independently! the underlying performance is highly dependent on selecting W W - reflects the expected number of contenders for the channel W increases exponentially [the rate depends on protocol] assumption: the sender can accurately check if channel is free/busy usually holds because: receiver sensibility << channel quality required for communication 6

Signal propagation ranges Transmission range communication possible low error rate etection range detection of the signal possible no communication possible Interference range signal may not be detected signal adds to the background noise sender transmission detection interference distance 7

TM TM - Time ivision Multiple ccess pproach: 1: construct a frame in which each node gets a slot to transmit F - frame size, fn - slot in which node n is assigned to transmit 2: a node n will transmit at time (t mod F) = fn Notes: time synchronization is required frame construction requires a global agreement among nodes underlying performance depends on matching a node s workload demand with its slot allocations hard to do due to dynamic workloads and channel properties assumption: only one successful transmission per slot 8

TM TM - Time ivision Multiple ccess pproach: 1: construct a frame in which each node gets a slot to transmit F - frame size, fn - slot in which node n is assigned to transmit 2: a node n will transmit at time (t mod F) = fn Notes: time synchronization is required frame construction requires a global agreement among nodes underlying performance depends on matching a node s workload demand with its slot allocations hard to do due to dynamic workloads and channel properties assumption: only one successful transmission per slot 8

Single-hop vs. multiple hops Single-hop networks both SM and TM protocols are easy to implement Multi-hop networks important challenges arise due to asymmetrical views of the networks hidden-terminal problem exposed-terminal problem 9

Hidden terminal problem Node and are hidden (edge () is not in the graph) they cannot sense their packet transmissions onsequences for M protocols SM protocols will never increase W TM protocols will have to agree on a frame over multiple hops 10

Hidden terminal problem Node and are hidden (edge () is not in the graph) they cannot sense their packet transmissions onsequences for M protocols SM protocols will never increase W TM protocols will have to agree on a frame over multiple hops 10

Hidden terminal problem undetected collisions Node and are hidden (edge () is not in the graph) they cannot sense their packet transmissions onsequences for M protocols SM protocols will never increase W TM protocols will have to agree on a frame over multiple hops 10

Exposed terminal problem Node and can communicate () and () can occur currently (collisions at receivers) onsequences for M protocols SM will increase W unnecessarily 11

Exposed terminal problem false positives Node and can communicate () and () can occur currently (collisions at receivers) onsequences for M protocols SM will increase W unnecessarily 11

RTS/TS a solution for SM protocols dd two additional messages to the TM protocol RTS - request to send TS - clear to send lgorithm node n wants to send packet to m transmit RTS(n, m) node a1, a2,..., an, m receive RTS(n, m) node m replies with TS(n, m) if its channel is free node b1, b2,..., bn, n receives TS(n, m) node n transmits the data packet The algorithm signals access requests over 2-hops 12

Hidden terminal problem 13

Hidden terminal problem send RTS(,) 13

Hidden terminal problem recv RTS(,) send RTS(,) 13

Hidden terminal problem recv RTS(,) send RTS(,) send TS(,) 13

Hidden terminal problem recv RTS(,) send RTS(,) recv TS(,) send TS(,) recv TS(,) 13

Exposed terminal problem send RTS(,) 14

Exposed terminal problem send RTS(,) send TS 14

Exposed terminal problem send RTS(,) ready to tx send TS 14

Exposed terminal problem send RTS(,) ready to tx send TS send RTS(, ) ready to tx 14

Exposed terminal problem send RTS(,) ready to tx send TS send RTS(, ) ready to tx send TS ready to tx 14

Exposed terminal problem send RTS(,) ready to tx send TS send RTS(, ) ready to tx send TS ready to tx ready to tx 14

WLN technology Protocol soup: Local wireless networks WLN 802.11 WiFi 802.11a 802.11h 802.11i/e/ /w 802.11b 802.11g Goals: seamless operation leverage on existing wired infrastructure low-power operation on stations Two architectures: infrastructure + ad-hoc 15

802.11: rchitecture of an infrastructure network ST 1 ESS SS 1 802.11 LN ccess Point istribution System SS 2 ccess Point 802.x LN Portal ST 2 802.11 LN ST 3 Station (ST) terminal with wireless access mechanisms to contact the access point asic Service Set (SS) group of stations using the same radio frequency ccess Point station integrated into the wireless LN and the distribution system Portal bridge to other (wired) networks istribution System interconnection network to/form one logical network 16

802.11: rchitecture of an ad-hoc network SS 1 ST 1 802.11 LN ST 3 irect communication within a limited range Station (ST): terminal with access mechanisms to the wireless medium Independent asic Service Set (ISS): group of stations using the same radio frequency When no direct link is feasible between two station, a third station may act as a relay (multihop communications) ST 2 802.11 LN 17

802.11b - istributed oordination Function Exponential back-off hosen for uniformly from (0, W-1), W increase exponentially with the number of failed attempts Wmin minimum contention window Wmax = 2 m Wmin maximum contention window 18

802.11b - istributed oordination Function Message resent when the backoff counter reaches zero ackoff counter decremented only when the channel is idle ackoff counter is reset to zero after a successful transmission 19

Routing Routing consists of two fundamental steps Forwarding packets to the next hop (from an input interface to an output interface in a traditional wired network) etermining how to forward packets (building a routing table or specifying a route) Forwarding packets is easy, but knowing where to forward packets (especially efficiently) is hard Reach the destination Minimize the number of hops (path length) Minimize delay Minimize packet loss Minimize cost 20

Routing ecision Point Source routing Sender determines a route and specifies it in the packet header Hop-by-hop (datagram) routing routing decision is made at each forwarding point (at each router) Standard routing scheme for IP Virtual circuit routing etermine and configure a path prior to sending first packet Used in TM (and analogous to voice telephone system) 21

Routing Table routing table contains information to determine how to forward packets Source routing: Routing table is used to determine route to the destination to be specified in the packet Hop-by-hop routing: Routing table is used to determine the next hop for a given destination Virtual circuit routing: Routing table used to determine path to configure through the network 22

Routing pproaches Reactive (On-demand) protocols discover routes when needed source-initiated route discovery Proactive protocols traditional distributed shortest-path protocols based on periodic updates. High routing overhead Tradeoff state maintenance traffic vs. route discovery traffic route via maintained route vs. delay for route discovery

istance Vector lgorithms (1) istance of each link in the network is a metric that is to be minimized each link may have distance 1 to minimize hop count algorithm attempts to minimize distance The routing table at each node specifies the next hop for each destination specifies the distance to that destination Neighbors can exchange routing table information to find a route (or a better route) to a destination 24

istance Vector lgorithms (2) est Next Metric 2 1 1 est Next Metric 1 2 3 est Next Metric 1 1 2 est Next Metric 3 2 1 25

istance Vector lgorithms (3) Node will learn of Node s shorter path to Node and update its routing table est Next Metric 1 1 2 est Next Metric 1 1 1 26

Reactive Routing Source initiated Source floods the network with a route request packet when a route is required to a destination flood is propagated outwards from the source pure flooding = every node transmits the request only once estination replies to request reply uses reversed path of route request sets up the forward path 27

Route iscovery RREQ FORMT G Initiator Initiator seq # estination I Partial Route E H -- Route Request (RREQ) F -- Route Reply (RREP) 28

Route iscovery RREQ FORMT G Initiator Initiator seq # estination I Partial Route -- E H Route Request (RREQ) F -- Route Reply (RREP) 28

Route iscovery RREQ FORMT - G Initiator Initiator seq # estination I Partial Route -- E H Route Request (RREQ) F -- Route Reply (RREP) 28

Route iscovery RREQ FORMT - G Initiator Initiator seq # estination I Partial Route -- E H Route Request (RREQ) - -- F Route Reply (RREP) 28

Route iscovery RREQ FORMT - G Initiator Initiator seq # estination I Partial Route --E -- - E --E --E H Route Request (RREQ) -- F Route Reply (RREP) 28

Route iscovery RREQ FORMT - -- G Initiator Initiator seq # estination I Partial Route --E -- - E --E --E H Route Request (RREQ) -- F Route Reply (RREP) 28

Route iscovery RREQ FORMT - --E -- G --E-H Initiator Initiator seq # estination I Partial Route -- - E --E --E H Route Request (RREQ) -- F Route Reply (RREP) 28

Route iscovery RREQ FORMT ---G - ---G ---G --E -- G --E-H Initiator Initiator seq # estination I Partial Route -- - E --E --E H Route Request (RREQ) -- F Route Reply (RREP) 28

Route iscovery: at source need to send to G Lookup ache for route to G Start Route iscovery Protocol wait uffer packet ontinue normal processing yes no Route found? yes Write route in packet header Route iscovery finished Packet in buffer? no done Send packet to next-hop 29

Route iscovery: t an intermediate node ccept route request packet <src,id> in recent requests list? yes iscard route request no ppend myddr to partial route Store <src,id> in list no Host already in partial route no myddr =target Send route reply packet yes iscard route request roadcast packet done 30

Route iscovery Route Reply message containing path information is sent back to the source either by the destination, or intermediate nodes that have a route to the destination reverse the order of the route record, and include it in Route Reply. unicast, source routing Each node maintains a Route ache which records routes it has learned and overheard over time 31

Route Maintenance Route maintenance performed only while route is in use Error detection: monitors the validity of existing routes by passively listening to data packets transmitted at neighboring nodes When problem detected, send Route Error packet to original sender to perform new route discovery Host detects the error and the host it was attempting; Route Error is sent back to the sender the packet original src 32