Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Similar documents
CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

CSCI-1680 Wireless Chen Avin

Module 6: Wireless Mobile Networks

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Multiple Access in Cellular and Systems

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Multiple Access Links and Protocols

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Chapter 6 Wireless and Mobile Networks

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks

CSC 4900 Computer Networks: Wireless Networks

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks (Wireless and Mobility)

Mohammad Hossein Manshaei 1393

Last Lecture: Data Link Layer

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Chapter 6 Wireless and Mobile Networks

CSC 8560 Computer Networks: Wireless and Mobility

CS 332 Computer Networks Wireless Networks

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

Chapter 5 Wireless and Mobile Networks

Computer Networks. Wireless LANs

Wireless LANs. ITS 413 Internet Technologies and Applications

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Mobile and Sensor Systems

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Chapter 6 Wireless and Mobile Networks

Wireless and Mobile Networks

Mohamed Khedr.

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

COMP 3331/9331: Computer Networks and Applications

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless and Mobile Networks

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Wireless Local Area Networks. Networks: Wireless LANs 1

Chapter 6 Medium Access Control Protocols and Local Area Networks

MSIT 413: Wireless Technologies Week 8

Local Area Networks NETW 901

Lecture 16: QoS and "

Already finished all layers in the stack, why a separate chapter for wireless and mobile networks?

MULTIPLE ACCESS PROTOCOLS 2. 1

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

COMP 3331/9331: Computer Networks and Applications

Hands-On Exercises: IEEE Standard

Chapter 3: Wireless and Mobile Networks

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Wireless LAN. Access Point. Provides network connectivity over wireless media

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling

Summary of MAC protocols

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Wireless Communications

Chapter 6 Wireless and Mobile Networks

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach. Andrei Gurtov

Chapter 6 Wireless and Mobile Networks

15-441: Computer Networking. Wireless Networking

Medium Access Control Sublayer Chapter 4

Data and Computer Communications. Chapter 13 Wireless LANs

CSE 461: Wireless Networks

ECS-087: Mobile Computing

Chapter 6 Wireless and Mobile Networks

EE 122: Ethernet and

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Principles behind data link layer services

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Lecture 15 Wireless and Mobility

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Wireless MACs: MACAW/802.11

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Communication Networks: Wireless and Mobile Communication Networks. Prof. Amir Herzberg BIU, Dept. of CS

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Multiple Access Links and Protocols

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network

ICE 1332/0715 Mobile Computing (Summer, 2008)

Medium Access Protocols

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Internet Structure. network edge:

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind)

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network

Wireless Local Area Networks (WLANs) Part I

CS263: Wireless Communications and Sensor Networks

Transcription:

Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just one big LAN? Limited amount of supportable traffic: on single LAN, all stations must share bandwidth Single collision domain Physical layer extension Repeaters copies (amplifies, regenerates) bits between LAN segments Link Layer extensions Bridges - connects (2) LAN segments Each segment is its own collision domain receives, stores, forward (when appropriate) packets between LANs Learn which host is connected on which interface Forget about the mapping after certain TTL soft state 2 Forwarding Algorithm Virtual LAN 1. bridge receives every packet transmitted on every attached LAN 2. bridge stores for each packet l physical address of sender l port (incoming LAN segment) on which pkt was received 3. for each packet received on any port: lookup dest. physical address in table l if not found, flood onto all attached LANs l if found, forward only out to specified LAN 4. forwarding table deleted if not refreshed q Extend subnets beyond physical LAN segments q Separate broadcast domains by VLAN ID q Hosts in the same subnet belong to the same VLAN ID q Hosts in the same subnet can be in different physical LAN segments q Broadcasts restricted to same VLAN only q Ports on switch mapped to VLAN ID VLAN2, Port3 VLAN1, Port1 VLAN1, Port4 VLAN2, Port2 3 1

Configuring the switch VLAN Types q Ports configured at switch q Hosts on same VLAN è same subnet q IP addresses for hosts need to confirm to the subnet 128.64.9/24 128.64.8/24 128.64.9/24 1 1 4 1 6 2 8 2 Port VLAN ID 128.64.8/24 6 q Port-based q Ports assigned to VLANS q MAC-based q Each MAC address manually programmed q IP-based q Port mapped to IP address/mask.. VLAN logical grouping VLAN Tagging No VLAN Tagging VLAN Tagging q VLANs provide segmentation based on broadcast domains. q VLANs logically segment switched networks based on the functions, departments, or applications regardless of the physical location or connections to the network. q VLANS can be connected by switches q Forwarding based on tagging (IEEE 802.1Q) 7 q VLAN Tagging is used when a single link needs to carry traffic for more than one VLAN. q IEEE 802.1Q 8 2

VLAN frame format. VLAN Tagging q ProtoID: 0x8100 (16 bits) q VLANID: 12 bits (4K different VLAN ids) q VLAN Tagging is used when a single link needs to carry traffic for more than one VLAN. Additional TAG field added to ethernet frame At the receiving switch, the Header is stripped and forwarded to the appropriate ports q. 10 Inter VLAN routing VLAN1 VLAN2 190.8.2/24 190.8.1/24 q Sending frame from VLAN 1 to VLAN2 q Layer 3 routing q VLAN1 sends frame to the default MAC address of router connected to VLAN1 q Router does a lookup and forwards it along the interface connected to VLAN2 Benefits of VLANs Organize subnet hosts logically without being attached to the same physical segment q Logical grouping q Dynamically add or remove hosts q Separate broadcast domains q Security 12 3

Multiple access channel partitioning q Static and predetermined allocation of channel access: independent of user activity q Idle users may be assigned to the channel, in which case channel capacity is wasted q Examples: TDMA, FDMA, CDMA Multiple Access Techniques TDMA/FDMA/ CDMA q Allow multiple users to share a common transmission medium q Techniques TDMA: Time division Multiple Access The spectrum usage is divided in the time domain People take turns using the spectrum (amount of time allocated is the slot time) FDMA: Frequency division multiple access The spectrum usage is divided in the frequency domain People are assigned portions of the spectrum for their own use (portion of the spectrum is the channel) CDMA: Code Division Multiple Access The entire spectrum is used by everyone but in a coded format The signal is spread and only the receiver who knows the code can recover the signal Analogy: people talking in different languages all at the same time 13 14 Spread Spectrum Techniques (Types of CDMA) Example q Two types of techniques exist q DS-CDMA and Frequency hopping CDMA q Direct sequence CDMA (DS-CDMA or DSSS) q Each bit of the signal is replaced by a code (longer bit sequence) A narrow band signal (R bps) is multiplied by a wideband signal (W bps) Receiver who knows the code will recover the signal; for the rest it appears as random noise Used in IEEE 802.11 Wavelan Data Code Output 1 0 1010 1010 0101 1010 15 Receiver uses the code and the received signal to recover Original data 16 4

Frequency hopping q Frequency sequence CDMA (FS-CDMA or FSSS) q A single user s signal is spread out over a number of channels (1011) is transmitted as f1, f9, f11, f13 The receiver who tunes to f1, f9, f11 and f13 in sequence will be able to recover the bit stream Used in Blue tooth wireless technology 802.11 Wireless Networking (Chapter 6.1-6.3) Basically wireless Ethernet Connects a number of computers in a wireless LAN Ad-hoc mode (AHM) as well as Access Point mode (APM) supported AHM - Only direct communication, no routing functionality APM - Computers connected to the Internet via an AP Typical mode of operation Access point name refers to a channel; a host connected to an AP tunes to the same channel as the AP 17 18 802.11 Physical Layer q Operates in the ISM band LBand 915 to 928 MHz and the SBand 2.4 to 2.4835 Ghz band are used for 802.11 q Uses Direct Sequence Spread Spectrum (DSSS) q Signal is sent in a coded form Topic of a course in communications q Initial versions were 1 to 2 Mbps. Now 802.11b is 11 Mbps q 802.11g provides up to 54 Mbps (Phase and Amplitude Keying) q 802.11n more range 100s of Mbps 802.11 DSSS q 83 MHz divided into eleven 22 MHz wide stationary channels At any point only 3 non-overlapping channels available q Spreading sequence is 11 bit barker word 1 is mapped to 1, -1, 1, 1, -1, 1, 1, 1, -1, -1, -1 0 is mapped to -1, 1, -1, -1, 1, -1, -1, -1, 1, 1,1 Same sequence is used by all hosts Multiple access problem needs to be solved q Input signal is spread to 22 MHz wide spectrum q Duration of 1 chip is 1/11 microsecond or 1 Mchips/sec q Different modulation schemes used to obtain different rates Binary Phase Shift Keying (gives 1 Mbps), Quadrature PSK (gives 2 Mbps), QPSK with Complementary Code Keying (4 bits/ symbol at chip rate of 1.375 Mcps (instead of 11/ use 8 bit barker code) gives 4*1.375 =5.5 Mbps and 8bits/symbol gives 11 Mbps) 19 20 5

802.11 Access Control 802.11 Access Control q Carrier sensing q Is the medium idle? à Wait for an amount of time (IFS), if still idle transmit q IFS = inter frame spacing q Is the medium busy? à Wait until current txm ends, wait (IFS), if idle wait for random amount of time, else wait until current txm ends and repeat q (exponential backoff for collisions) q If channel is found to be busy wait and start a backoff timer (min = 15 slots) Have Data Idle? Wait IFS Idle? N Txmt Data N Wait EOT Wait IFS Idle? N Start backoff Idle Busy Timer=0 21 q While the back off timer is running and channel becomes busy then stop timer and wait until channel becomes Idle q ACKs and immediate response actions can be sent after SIFS (Short IFS) < IFS value used in multiple access control q On a collision Double backoff timer value CWMIN++; q Exponential backoff Wait EOT F S Tx? Double Backoff timer Have Data Idle? Wait IFS Idle? N Txmt Data N Wait EOT Wait IFS Idle? N decr backoff Idle Busy Timer=0 22 Problems with Carrier Sensing Use of RTS, CTS X Z X Z W Hidden Terminal Problem Exposed Terminal Problem q Hidden terminal problem q Z does not hear X; hence transmits to and collides with transmission from X q No carrier does not imply send q Exposed terminal problem q W hears but can safely transmit to X q Carrier may not imply don t send q Sender sends a small packet RTS (request to send) before sending data q Receiver sends CTS (clear to send) q All potential senders hearing RTS waits until a CTS is heard from some receiver q If no CTS, transmit q If CTS, wait for a time for sender to send data q Hear RTS, but no CTS, then send Exposed terminal case q Don t hear RTS, but CTS receiver is close, don t send Hidden terminal case 23 24 6

802.11 frame: addressing 802.11 frame: addressing 2 2 6 6 6 2 6 0-2312 4 frame address address address address duration seq payload CRC control 1 2 3 control 4 H1 R1 router Internet Address 1: MAC address of wireless host or AP to receive this frame Address 2: MAC address of wireless host or AP transmitting this frame Address 3: MAC address of router interface to which AP is attached Address 4: used only in ad hoc mode AP R1 MAC addr H1 MAC addr dest. address source address 802.3 frame AP MAC addr H1 MAC addr R1 MAC addr address 1 address 2 address 3 802.11 frame 6-25 6-26 802.11 frame: more 2 2 6 6 6 2 6 0-2312 4 frame address address address address duration seq payload CRC control 1 2 3 control 4 Protocol version Type duration of reserved transmission time (RTS/CTS) Subtype To AP From AP More frag frame seq # (for RDT) 2 2 4 1 1 1 1 1 1 1 1 Power Retry mgt More data WEP Rsvd 802.11 Issues q Very popular in buildings, public spaces q Tremendous opportunities q Free/unlicensed spectrum interference issues q Security, privacy, authentication being added q Nice features to have Roaming across networks Remote authentication Mobile access frame type (RTS, CTS, ACK, data) 6-27 28 7

Bluetooth q A cable replacement technology q Operates in the ISM band (2.4Ghz to 2.8 Ghz) q Range is 10 cm to 10 meters can be extended to 100 meters by use of power control q Data rates up to 1 Mbps (721Kbps) q Supposed to be low cost, single chip radio q Ideal for connecting devices in close proximity (piconet) Phone and earpiece Computer and printer Camera and printer/fax etc q Can form personal area networks (piconet and scatternet) q IEEE 802.15.1 standard Personal area networks q Piconet Master/slave nodes Master and up to 7 slaves Master allocates channels q Scatternet Node may be master in one network and slave in another network Allows devices to be shared in different networks 29 30 Bluetooth Radio Link q IEEE 802.11 operates in the same band using DSSS q Bluetooth uses Frequency Hopping q 83.5 MHz channel is divided into 79 1-MHz channels 1600 hops per second (stays at one frequency for 625 microsecs) Hopping sequence is 16 or 32 Selected by the master based on its MAC address Master can connect up to seven slaves to form a piconet q All members of the piconet use the same hopping sequence Bluetooth Packet Format 72 bits Access Code 54 bits Header Payload (2744 bits) Access code identifies control packet type Channel access code, device access code, inquiry access code Header contains address (3 bits) and packet types (4 bits) Voice packets with different FEC rates Data packets with low bit rate and high bit rate (with varying FEC as well) 31 32 8

Connection establishment piconet Inquiry broadcast Inquiry scan q A set of bluetooth devices connected to a master q Scatternet: a set of piconets Page Response-FHS Inquiry response Unicast-DAC Page scan ACK-DAC Slave response Master response FHS-sender Connection ACK-DAC Connection 33 34 Bluetooth Link Formation Mobile IP Master inquires who is around Active slaves respond and the master learns who is around Master pages slaves and informs them of hopping sequence, active member address Active slaves get packets when header matches active member address A link is formed between master and each slave Inactive slaves can go into park state and give up address Master Slave Parked slave q RFC 3344 q has many features we ve seen: home agents, foreign agents, foreign-agent registration, care-of-addresses, encapsulation (packet-within-a-packet) q three components to standard: indirect routing of datagrams agent discovery registration with home agent 35 6-36 9

Mobile IP: indirect routing Mobile IP: agent discovery packet sent by home agent to foreign agent: a packet within a packet dest: 79.129.13.2 dest: 128.119.40.186 foreign-agent-to-mobile packet dest: 128.119.40.186 agent advertisement: foreign/home agents advertise service by broadcasting ICMP messages (typefield = 9) 0 8 16 24 Permanent address: 128.119.40.186 dest: 128.119.40.186 packet sent by correspondent Care-of address: 79.129.13.2 H,F bits: home and/or foreign agent R bit: registration required type = 9 code = 0 = 9 type = 16 registration lifetime router address checksum = 9 length sequence # RBHFMGV bits 0 or more care-ofaddresses reserved standard ICMP fields mobility agent advertisement extension 6-37 6-38 Mobile IP: registration example home agent HA: 128.119.40.7 foreign agent COA: 79.129.13.2 ICMP agent adv. COA: 79.129.13.2. visited network: 79.129.13/24 Mobile agent MA: 128.119.40.186 registration req. COA: 79.129.13.2 HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 9999 identification: 714 encapsulation format. registration req. COA: 79.129.13.2 HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 9999 identification:714. registration reply time HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 4999 Identification: 714 encapsulation format. registration reply HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 4999 Identification: 714. 6-39 10