Lecture 17: Wireless Networking"

Similar documents
Lecture 17: Wireless Networking

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Lecture 16: QoS and "

Wireless Local Area Network (IEEE )

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless LAN. Access Point. Provides network connectivity over wireless media

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Common problems in production Wireless Networks. Jigsaw: Solving the Puzzle of Enterprise Analysis. Sounds Familiar?

CSE 461: Wireless Networks

Local Area Networks NETW 901

Introduction to IEEE

Computer Communication III

Wireless and Mobile Networks 7-2

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

CMPE 257: Wireless and Mobile Networking

MSIT 413: Wireless Technologies Week 8

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Multiple Access in Cellular and Systems

Wireless Communications

MAC in /20/06

Strengthening Unlicensed Band Wireless Backhaul

Wireless LANs. ITS 413 Internet Technologies and Applications

Last Lecture: Data Link Layer

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Mobile Communications Chapter 7: Wireless LANs

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Data and Computer Communications. Chapter 13 Wireless LANs

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

IEEE Medium Access Control. Medium Access Control

Chapter 6 Wireless and Mobile Networks

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

CMPE 257: Wireless and Mobile Networking

Mohamed Khedr.

Internet Protocol Stack

Wireless and Mobile Networks

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

CSC 4900 Computer Networks: Wireless Networks

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Link Layer: Retransmissions

Data Communications. Data Link Layer Protocols Wireless LANs

Wireless Local Area Networks (WLANs) Part I

Wireless MACs: MACAW/802.11

Wireless LAN -Architecture

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Automating Cross-Layer Diagnosis of Enterprise Wireless Networks

CS698T Wireless Networks: Principles and Practice

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Wireless Communication and Networking CMPT 371

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

CS 332 Computer Networks Wireless Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

Wireless Protocols. Training materials for wireless trainers

Wireless Networking & Mobile Computing

Computer Networks. Wireless LANs

Mobile and Sensor Systems

ICE 1332/0715 Mobile Computing (Summer, 2008)

Mohammad Hossein Manshaei 1393

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

CS263: Wireless Communications and Sensor Networks

15-441: Computer Networking. Wireless Networking

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

IEEE MAC Sublayer (Based on IEEE )

ICE 1332/0715 Mobile Computing (Summer, 2008)

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

COMP 3331/9331: Computer Networks and Applications

Hands-On Exercises: IEEE Standard

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1

3.1. Introduction to WLAN IEEE

SENSOR-MAC CASE STUDY

Medium Access Control

EE 122: Ethernet and

Mohammad Hossein Manshaei 1393

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

CSCI-1680 Wireless Chen Avin

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Medium Access Control Sublayer Chapter 4

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Lesson 2-3: The IEEE x MAC Layer

Chapter 7: Wireless LANs

CSE 461 Multiple Access. David Wetherall

Wireless & Mobile Networking

Page 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs

Mobile Communications Chapter 7: Wireless LANs

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Investigation of WLAN

Transcription:

Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya

Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion 2

Project update" Second checkpoint due Thursday 1-2 page summary of your progress since last checkpoint Project presentations Thursday 3/20 Sign up for a 25-minute slot between 9:00am and 4:30pm» 20 minute presentation (including all project members)» 3-4 minutes for questions You will be expected to attend at least 5 presentations and actively participate in discussion Reports due Friday 3/21 by midnight 3

IEEE 802.11 Infrastructure" mobile terminal fixed terminal application infrastructure network application TCP IP access point TCP IP LLC LLC LLC 802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC 802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY 4

802.11 Physical Layers "" 802.11b - 2.4 GHz ISM band FHSS (Frequency hopping spread spectrum); deprecated DSSS (Direct sequence spread spectrum) Up to 11 Mbps 802.11a/g - 2.4 GHz ISM band / 5.0 GHz UNII band OFDM (Orthogonal frequency domain multiplexing) Up to 54 Mbps 802.11n 2.4/5.0 GHz bands Adds MIMO and other tricks to 802.11g Up to 300-500 Mbps! Each backwards compatible with the previous ones 5

IEEE 802.11b" Data rate 1, 2, 5.5, 11 Mbit/s User data rate max. approx. 6 Mbit/s Transmission range 300m outdoor, 30m indoor Max. data rate ~10m indoor Frequency Free 2.4 GHz ISM-band 6

802.11b Physical Channels" 12 channels available for use in the US Each channel is 20+2 MHz wide Only 3 orthogonal channels Using any others causes interference US (FCC)/Canada (IC) channel 1 channel 6 channel 11 2400 2412 2437 2462 2483.5 22 MHz [MHz] 7

Carrier Sense Multiple Access" CSMA: listen before transmit If channel sensed idle: transmit entire packet If channel sensed busy, defer transmission Persistent CSMA: retry immediately with probability p when channel becomes idle (may cause instability) Non-persistent CSMA: retry after random interval But what about collisions? 8

CSMA/CA" Impossible to hear collision w/half-duplex radio Wireless MAC protocols often use collision avoidance techniques, in conjunction with a (physical or virtual) carrier sense mechanism Collision avoidance Nodes negotiate to reserve the channel. Once channel becomes idle, the node waits for a randomly chosen duration before attempting to transmit. 9

Hidden Terminal Problem" A B C B can communicate with both A and C A and C cannot hear each other Problem When A transmits to B, C cannot detect the transmission using the carrier sense mechanism Solution If C transmits, collision will occur at node B Hidden sender C needs to defer 10

RTS/CTS (MACA)" A B C When A wants to send a packet to B, A first sends a Request-to-Send (RTS) to B On receiving RTS, B responds by sending Clear-to- Send (CTS), provided that A is able to receive the packet When C overhears a CTS, it keeps quiet for the duration of the transfer Transfer duration is included in both RTS and CTS 11

Backoff Interval " Problem: With many contending nodes, RTS packets will frequently collide Solution: When transmitting a packet, choose a backoff interval in the range [0, CW] CW is contention window Wait the length of the interval when medium is idle Count-down is suspended if medium becomes busy Transmit when backoff interval reaches 0 Need to adjust CW as contention varies 12

Jigsaw: What Really Happens" Measure real large wireless networks Collect every possible information» PHY/Link/IP/TCP/App layer trace» Collect every single wireless packet Need many sniffers for 100% coverage Automatically merge traces Global view of wireless networks across time, locations, channels, and protocol layers Enables manual and automatic diagnosis 13

Our lab: EBU3b" 150k square feet 4 floors 500+ occupants 150 faculty/staff 350 students Building-wide WiFi 39 access points 802.11b/g» Channel 1, 6, 11 10 90 active clients anytime Daily Traffic ~5GB 14

Jigsaw Deployment" Overlays existing WiFi network Series of passive sniffers Blanket deployment over 4 floors 39 sensor pods (156 radios) 4 radios per pod, cover all channels in use Captures all 802.11 activities» Including CRC/PHY events Stream back over wired network to centralized storage

Jigsaw design" Traces synchronization and unification L2 state reconstruction TCP flow reconstruction 16

Synchronization" o Frames carry TSF time-stamps o Need a global clock o Estimate the offset between TSF and the global clock for each sniffer

Synchronization" Create a virtual global clock To keep unification working Critical evidence for analysis» If A and B are transmitting at the same time they could interfere» If A starts transmitting after B has started then A can t hear B Require fine time-scales (10-50us) NTP is +100 usec accuracy 802.11 HW clocks (TSF) have 100PPM stability TSF diff (us) TSF diff of two sniffers Time (s)

Ideal Unification" Time

Real Unification" Jigsaw unified trace JFrame 1 JFrame 2 Time JFrame 3 JFrame 4 JFrame 5

Challenge: sync at large-scale" T o 1 2 3 4 σ t 1 t 3 How to bootstrap? Goal: estimate the offset between TSF and the global clock for each sniffer Time reference from one sniffer to the other Sync across channels Dual radios on same sniffer slaved to same clock (creates a de facto time linkage) Manage TSF clock skews Continuously re-adjust offsets when merging frames

Jigsaw in Action" Jigsaw merges 156 traces into one global trace Covers 99% of AP frames, 96% of client frames Starts Jan 24,2006 (Tuesday) Duration Total APs 24 hr CSE Clients 1026 Active CSE clients anytime 107 (39 CSE) 10-90 Total Events 2,700M PHY/CRC Errors 48% Valid Frames 52% JFrames Events per Jframe 530M 2.97

Jigsaw syncs 99% frames < 20us" o Measure sync. quality by max dispersion per Jframe o 20 us is important threshold n 802.11 back-off time is 20us n 802.11 inter frame time is 50 us n Sufficient to infer many 802.11 events

L2-ACK Beacon

Hidden Terminals"

For Next Class " Read and review ExOR paper Keep going on projects! Checkpoint 2 due Thursday 26