Lecture 16: Wireless Networking

Similar documents
Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space

CSCI-1680 Wireless Rodrigo Fonseca

Topics Today. Lecture 8: Physical and Link Layers. Protocol Layering. Physical layer: chips versus bits. Physical Layer (Layer 1) Protocol Layering

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless MACs: MACAW/802.11

CMPE 257: Wireless and Mobile Networking

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Computer Networks. Wireless LANs

Last Lecture: Data Link Layer

Wireless Mesh Networks

15-441: Computer Networking. Wireless Networking

Hands-On Exercises: IEEE Standard

Wireless and Mobile Networks 7-2

CSC 4900 Computer Networks: Wireless Networks

CMPE 257: Wireless and Mobile Networking

Multiple Access Links and Protocols

Multiple Access in Cellular and Systems

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Wireless LANs. ITS 413 Internet Technologies and Applications

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Chapter 6 Wireless and Mobile Networks

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Link Layer II: MACA and MACAW

Lecture 16: QoS and "

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

CS 640 Lecture 4: 09/11/2014

Mohammad Hossein Manshaei 1393

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

ECE 4450:427/527 - Computer Networks Spring 2017

Mobile and Sensor Systems

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Chapter 12 Multiple Access 12.1

CHAPTER 7 SIMULATION OBSERVATIONS

Local Area Networks NETW 901

CS 3640: Introduction to Networks and Their Applications

Link Layer: Retransmissions

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

CSE 461: Multiple Access Networks. This Lecture

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Strengthening Unlicensed Band Wireless Backhaul

EE 122: Ethernet and

Mohammad Hossein Manshaei 1393

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals

CS 268: Computer Networking. Taking Advantage of Broadcast

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Collisions & Virtual collisions in IEEE networks

CSE 461 Multiple Access. David Wetherall

Wireless Local Area Networks. Networks: Wireless LANs 1

Data and Computer Communications. Chapter 13 Wireless LANs

MULTIPLE ACCESS PROTOCOLS 2. 1

Wireless LAN. Access Point. Provides network connectivity over wireless media

CE693: Adv. Computer Networking

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Wireless and Mobile Networks

3.1. Introduction to WLAN IEEE

CSCI-1680 Wireless Chen Avin

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind)

Investigation of WLAN

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Media Access Control in Ad Hoc Networks

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

CSCI-1680 Physical Layer Link Layer I Rodrigo Fonseca

Link Layer and Ethernet

Link Layer and Ethernet

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Link Layer. (continued)

Wireless Networking & Mobile Computing

Links. CS125 - mylinks 1 1/22/14

MSIT 413: Wireless Technologies Week 8

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Internet Structure. network edge:

Guide to Wireless Communications, Third Edition. Objectives

By N.Golmie Presented by: Sushanth Divvela

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Mohamed Khedr.

Wireless Intro : Computer Networking. Wireless Challenges. Overview. TCP on wireless links Wireless MAC Assigned reading.

Wireless Internet Routing. Learning from Deployments Link Metrics

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Data Communications. Data Link Layer Protocols Wireless LANs

Wireless Networks. Wireless Links. Mike Freedman hap:// Interference / bit errors

Link Estimation and Tree Routing

CS 332 Computer Networks Wireless Networks

CSE 461: Wireless Networks

Mohammad Hossein Manshaei 1393

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Sample solution to Midterm

Data Link Layer Technologies

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang

Transcription:

Lecture 16: Wireless Networking

Outline Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals - CSMA/CA - RTS/CTS Wireless routing and throughput

Ethernet: 802.3 Dominant wired LAN technology - 10BASE5 (vampire taps) - 10BASE-T, 100BASE-TX, 1000BASE-T Frame format: Preamble 7 x 10101010 Physical Link Layer 3 Link SFD 10101011 Src Dest Type/ Len Payload 6 bytes 6 bytes 2 bytes 46-1500 bytes CRC 4 bytes Gap 96 ns, 960 ns, 9600 ns

Physical Layer (Layer 1) Responsible for specifying the physical medium - Category 5 cable (Cat5): 8 wires, twisted pair, RJ45 jack - WiFi wireless: 2.4GHz Responsible for specifying the signal - 100BASE-T: 5-level pulse amplitude modulation (PAM-5) - 802.11b: Binary and quadrature phase shift keying (BPSK/QPSK) Responsible for specifying the bits - 100BASE-T: 4-to-6 bit-to-chip encoding, 3 chip symbols - 802.11b: Barker code (1-2Mbps), complementary code keying (5.5-11Mbps)

Wireless is Different Variable: signal attenuates over space Interference: other RF sources can interfere with signal Multipath: signal can self-interfere Distributed: nodes cannot detect collisions To address these differences, wireless link layers use slightly different mechanisms Also, can t just abstract away the physical and link layers: need a brief introduction to underlying EE

Attenuation Over Space Signal weakens as distance from transmitter increases Reflections, obstructions, etc. complicate the attenuation Depending on the antenna, not uniform in all directions Much more complex than the wired model

Signal Strength Over Space

Directional Antennas

Interference In unlicensed bands (e.g., 802.11), there are lots of transmitters - 802.11 cards - 802.15.1 (Bluetooth) - 802.15.4 (ZigBee) - 2.4GHz phones - Microwave ovens This interference can be stronger or weaker than the signal, and can prevent successful reception

Analog Signals Amplitude Wavelength

Specifying the Signal: Modulation 1 0 1 1 0 1 On-Off Keying (OOK) Amplitude Shift Keying (ASK)

Modulation, Continued 1 0 1 1 0 1 Frequency Shift Keying (FSK) Phase Shift Keying (PSK)

I/Q Modulation I: in-phase, Q: quadrature Sum of two sines is a sine Show what the carrier looks like compared to a simple, unmodulated signal Use I/Q because this is how it s actually done in hardware

I+Q

Modulation in I/Q Plots Q Q Q Q Q I OOK ASK FSK BPSK QPSK

Example measurements from 16-QAM

Signal, Noise, and Interference Signal: energy of desired transmission Noise/Noise floor: energy of hardware thermal effects Interference: energy of other transmitters Usually measured in dbm/dbw: 0dBm = 1mW, 0dBW = 30dBm = 1W - Note db is a logarithmic scale: 10dBm = 10mW, 20dBm = 100mW

Signal Plus Noise

SINR Signal to Interference-and-Noise Ratio Measured in db: S N+I - S = -50dBm, N+I = -95dBm, SINR = 35dB - S = -89dBm, N+I = -93dBm, SINR = 4dB SINR is particularly critical in wireless because of attenuation over space

Bit Error Rates There is a theoretical limit on how much information a channel can carry (Shannon limit) Bit error rate depends on the SINR and the modulation This is why wireless link layers use more complex chip/bit encoding - If signal is strong (high SINR), have few chip errors, can use low encoding - If signal is weak (low SINR), have many chip errors, use higher encoding to recover from errors

Application Note 9804 Example Theoretical Bit Error Rates fed through a mmed together larly effective in mission over ment in rapidly ces and homes in relation to t on system cost expensive to BE 1.0E-01 1.0E-02 1.0E-03 1.0E-04 1.0E-05 MSK, PSK DBPSK, DQPSK COHERENT OOK, OFSK 1.0E-06 INCOHERENT OOK, OFSK Z -1 4 W n L EQUALIZER OUT ER 1.0E-07 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 E b /N o (db) FIGURE 4. PROBABILITY OF BIT ERROR FOR COMMON MODULATION METHODS For the purposes of link budget analysis, the most important aspect of a given modulation technique is the Signal-to- Noise Ratio (SNR) necessary for a receiver to achieve a

Variable Bit Rates 802.11b supports 1, 2, 5.5, and 11Mbps 2, 5.5Mbps and 11Mbps are QPSK To support this, the signal field says what the data rate is - 00001010: 1Mbps (11 chips/bit, barker code) - 00010100: 2Mbps (11 chips/bit, barker code) - 00110111: 5.5Mbps (2 chips/bit, CCK) - 01101110: 11Mbps (1 chip/bit, CCK) So the header is still at 1Mbps, even if the data is at 11Mbps

Collisions are not so simple -40dB -60dB A B C If A transmits first, B can still decode its packet If C transmits first, A will corrupt its packet and B can t decode C s packet What if AB and BC are both -60dB? Signal strength matters: this is the RF capture effect

802.11 Packet Loss Rates

802.11 Packet Loss Rates (at 11Mbps) 100% 80% % Links 60% 40% 20% 0% 0.0 0.2 0.4 0.6 0.8 1.0 Packet Reception Ratio How does this affect TCP?

Wireless PHY Summary Can t control or limit the channel Need to deal with weak signals, interference, etc. Signal strength affects collisions Many different kinds of modulation: amplitude, frequency, phase Use robust encodings when needed, use fast speeds when possible Lots of intermediate packet delivery ratios

2 minute break

MAC Layer Responsibilities Arbitrate control of the channel One node should be able to use 100% Multiple nodes should get a fair share Want high utilization under contention

CA versus CD Collision detect (CD) is hard in wireless Local signal is much stronger than anything received Protocols use collision avoidance (CA) by sensing the channel

Simple MAC: CSMA/CA 1) Wait a small random period, check the channel 2) If the channel is busy, go to 1 (maybe longer wait) 3) Transmit packet S B 1 B 2 B 3 B 4, TX

802.11b MAC: CSMA/CA Maintain a waiting counter c For each time step channel is idle, c When c = 0, transmit If packet is not acknowledged (layer 2), pick a new, larger c - Use lack of layer 2 ack as collision detect S B 1, TX B 2, ACK

Problems with CSMA/CA Want to know state of channel at receiver, not transmitter But wireless is not transitive! - A hears B - A hears C - B and C may not hear each other - B and C can only sense their channel, but need to know if A s channel is clear

Hidden Terminal Problem B A C B and C can t hear each other, A can hear both B and C sense a clear channel, transmit, and collide at A B is a hidden terminal to C, and C is a hidden terminal to B

Exposed Terminal Problem B A C D A transmits to B C hears the transmission, backs off, even if it wants to transmit to D C is an exposed terminal to A s transmission

RTS/CTS Request-to-send, Clear-to-send (RTS/CTS) Allows transmitter to check availability of channel at receiver Transmitter sends an RTS If it hears a CTS, sends data If not, retries RTS some time later If you hear a CTS for someone else, don t transmit

RTS RTS B A C

CTS CTS B A C

Data Data B A C

Network Allocation Vector (NAV) 802.11b supports RTS/CTS NAV is data structure node uses to know when channel may be clear NAV is in terms of time: variable bit rates, RTS, etc.

RTS/CTS Benefits Solves the hidden terminal problem (assuming CTS not corrupted) - In practice, not true: a node s CTS can collide with another node s RTS - In practice, can reduce but not solve the hidden terminal problem on data - Control packets still collide Improves data packet delivery ratio Does it solve the exposed terminal problem? What about ACKs? B A C D

RTS/CTS Drawbacks 3 packets per packet: RTS/CTS/DATA RTS still go through CSMA: they can be lost CTS losses cause lengthy retries 33% of IP packets are TCP ACKs: is it worth it? In practice, WiFi doesn t use RTS/CTS

Wireless Routing Network is much more dynamic Not constrained by physical topology Discovering and estimating links to neighbors Discovering and maintaining routes to nodes Rich area of study: we ll just touch on link cost

Hopcount Considered Harmful Minimizing hopcount causes protocol to choose long links Links are more likely to be on edge of SNR/PRR curve - Less stable - Require more maintenance One way wireless routing is different OLSRv2 adds the concept of link metrics

DSDV and Hopcount on Roofnet Cumulative fraction of node pairs 1 0.8 0.6 0.4 0.2 0 Max 4-hop throughput Run R1: 1 mw, 134-byte packets 3-hop 2-hop Best static route DSDV hopcount 0 50 100 150 200 250 300 350 400 450 Packets per second delivered Packets per second delivered 200 150 100 50 0 23-19-24-36 Run R1: 1 mw, 134-by Max 3-hop throughput Max 4-hop 23-37-24-36 23-37-19-36 23-12-19-36 23-19-11-36 Figure 3: Throughput available betw and 36, along the best eight routes te routes does not perform the best, an routes with the same number of hops ent throughput. From DeCouto et al., A High-Throughput Path Metric for Multi-Hop Wireless Routing. Figure 2: When using the minimum hop-count metric, DSDV chooses paths with far less throughput than the best available routes. Each line is a throughput CDF for the same 100 randomly selected node pairs. The left curve is the throughput CDF of DSDV with minimum hop-count. The right curve is the CDF of the best throughput between each pair, found by trying a number of promising paths. The dotted vertical lines mark the theoretical maximum throughput of routes of each hop-count. about 100 packets per second. The min slow because they include links with hi bandwidth to be consumed by retransm 2.3 Distribution of Path Th Figure 3 illustrates a typical case in routing would not favor the highest-thro put of eight routes from node 23 to nod are the eight best which were tested in above. The graph shows that the shortest pa node 19, does not yield the highest th

Variations Across Hopcounts n R1: 1 mw, 134-byte packets op ut 3-hop 2-hop Packets per second delivered 200 150 100 50 0 Run R1: 1 mw, 134-byte packets Max 3-hop throughput Max 4-hop 23-19-24-36 23-37-24-36 23-37-19-36 23-12-19-36 23-19-11-36 23-19-36 23-19-20-36 23-19-7-36 Best static route DSDV hopcount 00 150 200 250 300 350 400 450 Packets per second delivered Figure 3: Throughput available between one pair of nodes, 23 and 36, along the best eight routes tested. The shortest of the routes does not perform the best, and there are a number of routes with the same number of hops that provide very different throughput. From DeCouto et al., A High-Throughput Path Metric for Multi-Hop Wireless Routing. the minimum hop-count metric, DSDV r less throughput than the best available throughput CDF for the same 100 ranpairs. The left curve is the throughput inimum hop-count. The right curve is hroughput between each pair, found by about 100 packets per second. The minimum hop-count routes are slow because they include links with high loss ratios, which cause bandwidth to be consumed by retransmissions. 2.3 Distribution of Path Throughputs Figure 3 illustrates a typical case in which minimum hop-count routing would not favor the highest-throughput route. The through-

Expected Transmissions (ETX) Proposed by DeCouto et al. Alternative metric: ETX, number of transmissions until you receive an ACK Cost of link is 1 P RR AB ARR BA - P RR AB = 75%, ARR BA = 66%, ET X AB = 2.0 - P RR AB = 50%, ARR BA = 50%, ET X AB = 4.0 Cost of route is sum of ETX values of links on route

ETX Benefits 1 Max 4-hop throughput Run R1: 1 mw, 134-byte packets 3-hop 2-hop 450 400 y=x Run R1: 1 mw, 134 Cumulative fraction of node pairs 0.8 0.6 0.4 0.2 0 Best static route DSDV ETX DSDV Hop-count 0 50 100 150 200 250 300 350 400 450 Packets per second delivered DSDV ETX packets per second 350 300 250 200 150 100 50 0 0 50 100 150 200 25 DSDV Hop-count pac Figure 6: ETX finds higher throughput routes than minimum hop-count. This data is taken from the same experimental run as Figure 2. Each point represents one of 100 node pairs. From DeCouto et al., A High-Throughput Path Metric for Multi-Hop Wireless Routing. In DSR experiments with ETX or minimum hop-count, a source starts by sending one data packet per second for five seconds. This ensure that DSR finds a route before throughput measurements are taken. After the five seconds passes, the source sends packets as fast as possible for 30 seconds. In DSR experiments with ETX, the source waits an additional 15 seconds before initiating the route request, to give the nodes time to accumulate link measurements. Figure 7: The ETX and hop-count on a per-pair basis. The x value of throughput for DSDV with minim shows the throughput for DSDV w line y = x are pairs where ETX out ETX outperforms minimum hopwhen the hop-count metric uses link ratios. This is illustrated by the poin y relatively large. Minimum hop-co

ETX Is Not Enough 802.11b supports four different bit rates ETX can select the route, but not the bitrate One packet at 11Mbps one packet at 1Mbps Solution: Estimated Time of Transmission (ETT) - Probe at different bit rates - Choose link bit rate based on minimum cost

Link Metrics Today Rough consensus that ETX/ETT is the right metric - Addresses intermediate links - Can be used across link layers No consensus on how to estimate the value - Several proposals - Still an active area of research Issue: conflates hopcount and link quality, making loops very easy (100% 33% can look like 2 more hops) Issue: minimizes delay, does not maximize throughput

Throughput Dropoff Only every third node can transmit, or you get the hidden terminal problem In TCP, data and ack packets cause the hidden terminal problem data data A B C D data ack A B C

Wireless Routing Maintaining consistent, distributed state on a dynamic system Preventing loops via serialization or source routing On-demand versus continuous ETX/ETT better metric than hopcount