Enabling Technologies

Similar documents
Data Communications. Data Link Layer Protocols Wireless LANs

Optional Point Coordination Function (PCF)

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Computer Networks. Wireless LANs

MAC in /20/06

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Mohamed Khedr.

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Computer Communication III

Introduction to IEEE

Local Area Networks NETW 901

Lecture 16: QoS and "

Mobile Communications Chapter 7: Wireless LANs

Wireless Local Area Networks. Networks: Wireless LANs 1

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Wireless Communications

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Advanced Computer Networks WLAN

Wireless Communication Session 4 Wi-Fi IEEE standard

Guide to Wireless Communications, Third Edition. Objectives

Mobile Communications Chapter 7: Wireless LANs

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

MSIT 413: Wireless Technologies Week 8

IEEE Technical Tutorial. Introduction. IEEE Architecture

Wireless Protocols. Training materials for wireless trainers

Nomadic Communications WLAN MAC Fundamentals

Wireless# Guide to Wireless Communications. Objectives

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

IEEE Wireless LANs

ICE 1332/0715 Mobile Computing (Summer, 2008)

Data and Computer Communications. Chapter 13 Wireless LANs

CSE 461: Wireless Networks

Unit 7 Media Access Control (MAC)

IEEE Medium Access Control. Medium Access Control

CMPE 257: Wireless and Mobile Networking

Chapter 7: Wireless LANs

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless Local Area Network (IEEE )

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Chapter 7: Wireless LANs

Multiple Access Links and Protocols

Wireless LAN -Architecture

Chapter 6 Wireless and Mobile Networks

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Chapter 6 Medium Access Control Protocols and Local Area Networks

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Internet Protocol Stack

3.1. Introduction to WLAN IEEE

Wireless and Mobile Networks 7-2

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal

Introduction to Wireless LAN

Wireless and Mobile Networks

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

IEEE MAC Sublayer (Based on IEEE )

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Page 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Mobile Communications Chapter 7: Wireless LANs

Wireless Networked Systems

Mobile Communications Chapter 7: Wireless LANs

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Wireless Local Area Networks (WLANs) Part I

Wireless LAN. Access Point. Provides network connectivity over wireless media

Lesson 2-3: The IEEE x MAC Layer

Guide to Wireless Communications, 3 rd Edition. Objectives

ECE 435 Network Engineering Lecture 8

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

IEEE Wireless LANs Part I: Basics

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Wireless LANs. Characteristics Bluetooth. PHY MAC Roaming Standards

ECE442 Communications Lecture 3. Wireless Local Area Networks

CMPE 257: Wireless and Mobile Networking

Mohammad Hossein Manshaei 1393

Data and Computer Communications

CSC 4900 Computer Networks: Wireless Networks

IEEE WLAN (802.11) Copyright. Nomadic Communications

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Last Lecture: Data Link Layer

Wireless Intro : Computer Networking. Wireless Challenges. Overview. TCP on wireless links Wireless MAC Assigned reading.

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

Mobile and Sensor Systems

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

Amarjeet Singh. February 7, 2012

Chapter 4 WIRELESS LAN

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

MULTIPLE ACCESS PROTOCOLS 2. 1

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Mohammad Hossein Manshaei 1393

Transcription:

Enabling Technologies Part 4 Mobile Ad Hoc Networking Wuhan University Why Enable? Reliable point-to-point communication via media access control (MAC) Challenges in medium share Categories of MAC protocols Random access principles Case studies IEEE 802.11, Bluetooth More PHY/MAC standards WiMax, ZigBee, UWB 1

Digital Radio Properties Higher bit error rate (BER) Several orders compared to wired medium Path loss signal attenuation At least quadratic of distance; could be 4 th power Fading effects Shadow fading (large-scale) Doppler and multipath fading (small-scale) MAC in Wireless Networks Contention resolution and collision handling ALOHA & CSMA/CD recall CSMA/CD in Ethernet not working here Half duplex transceiver More challenges Hidden terminal problem Exposed terminal problems 2

Hidden Terminal Problem A, B, C three nodes B can talk to A and C directly, but A and C can t talk to each other When A transmits to B, node C, not aware of the ongoing transmission, may transmit and collide with A s transmission A B C Exposed Terminal Problem A, B, C, D four nodes Only AB, BC, and CD can talk to each other directly When B transmits to A, node C, aware of the ongoing transmission, can t transmit to D, even though there will not be interference at D A B C D 3

A Simple Categorization Wireless MAC Centralized Distributed Guaranteed or Controlled access Random access How to Solve Hidden Terminals? Your inputs 4

Busy Tone [Tobagi75,Haas98] A receiver transmits busy tone when receiving data All nodes hearing busy tone keep silent Avoids interference from hidden terminals Requires a separate channel for busy tone MACA [Karn90] Three-way handshake When A wants to transmit to B, it first sends an RTS (Request-To-Send) packet After receiving A s RTC, B sends a CTS (Clear-To-Send) packet After receiving B s CTS, B sends the DATA packet A B C Data RTS CTS 5

MACA (Cont d) When should C reactivate? Both RTS and CTS contain duration information for overhearing nodes, e.g. C, to reactivate after specified silent period A B C RTSCTS Data MACA (Cont d) When should C reactivate? Both RTS and CTS contain duration information for overhearing nodes, e.g. C, to reactivate after specified silent period A B C 6

MACAW [Bharghavan94] Simple modification to improve reliability Four-way handshake RTS/CTS/DATA/ACK Essential ingredient of IEEE802.11 s DCF A B C D RTSCTS DataACK MACAW [Bharghavan94] Simple modification to improve reliability Four-way handshake RTS/CTS/DATA/ACK Essential ingredient of IEEE802.11 s DCF A B C D 7

802.11 WLAN 802.11 WLAN components Access Point (AP) + Mobile Stations (MS) + Distribution System (DS) 802.11 WLAN Modes BSS basic service set (infrastructure mode) ESS extended service set (multiple AP s) IBSS independent BSS (ad hoc mode) IEEE 802.11 Scope of Standard Upper layer protocols of OSI Data link layer Physical layer Logic Layer Control (LLC) 802.2 Medium Access Control (MAC) PHY FH, DS, IR IEEE 802.11 8

IEEE 802.11 Family 802.11 (legacy)1997 2Mbps/2.4GHz 802.11a - 1999 54Mbps/5.2GHz Yr 1999 802.11b 1999 11Mbps/2.4GHz 54Mbps OFDM 802.11g - 202 54Mbps/2.4GHz 2.4GHz 802.11e QoS 802.11h European 802.11i Security IEEE 802.11 Legacy Standardized 1-2Mbps wireless LAN Multiple PHY layer choices Centralized and ad hoc control Great start point 9

PHY Physical Layer Diffused Infrared (IR) 2.4~2.483GHz ISM band: Frequency-Hopping Spread Spectrum (FHSS) Dwell time = 20ms 79 1MHz channels with 22 hopping patterns Direct-Sequence Spread Spectrum (DSSS) Barker sequence 11-bit chipping sequence 14 partially overlapping 22MHz channels Center frequencies 5MHz apart Channels 1~11 available in N. America 1, 6, 11 can operate at the same time with 25 MHz apart MAC Main Requirements Single MAC to support multiple PHYs Support single and multiple channel PHYs and PHYs with different Medium Sense Characteristics Should allow overlap of multiple networks in the same area and channel space Need to be able to share the medium Allow re-use of the same medium Need to be robust for interference Microwave interferers Other un-licensed spectrum users Co-channel interference Need mechanisms to deal with Hidden Terminals Need provisions for Time Bounded Services Need provisions for Privacy and Access Control 10

Basic MAC Features Use Distributed Coordination Function (DCF) for efficient medium sharing Use CSMA/CA Based on carrier sense function of PHY Clear Channel Assessment (CCA) Robust for interference CSMA/CA + ACK for unicast frames MAC level recovery CSMA/CA for broadcast frames Parameterized use of RTS/CTS to provide virtual carrier sense function to protect against hidden nodes Duration information is distributed by both sender and receiver through separate RTS/CTS frames Support fragmentation to cope different MSDU lengths Coordination Functions PCF Point Coordination Function Infrastructure mode Optional DCF Distributed Coordination Function Infrastructure and ad hoc modes Mandatory MAC protocol intended to implement ad hoc networks Implement different fixed priority levels DIFS distributed inter-frame space PIFS point inter-frame space SIFS short inter-frame space 11

CSMA/CA Explained Reduce collision probability where mostly needed STAs are waiting for medium to become free for longer than DIFS CCA from PHY and virtual carrier sense Select random backoff in current collision window after a defer, resolving contention to avoid collisions Efficient backoff algorithm stable at high loads Exponential contention window increases for retransmissions (up to max limit) Resets to min value when transmission succeeds CSMA/CA + ACK Receiver sends ACK after receiving frame with correct CRC Direct access when medium is sensed free for longer than SIFS No random backoff needed SIFS < DISF to give ACK higher priority than a new transmission of data frame Such technique of using different inter-frame spaces to differentiate priorities is extensively used in 802.11 MAC 12

Hidden Terminal Separate control frames (RTS/CTS) between sender and receiver will reserve the medium for subsequent data exchange Duration information included in all frames Hidden Terminal Resolution Duration fields in RTS and CTS frames distributes medium reservation information, stored in an overhearing node s counter Network Allocation Vector (NAV) Medium busy decided by CCA and NAV Use of RTS/CTS is optional but must be implemented Use is controlled by an RTS_Threshold parameter in each STA to limit overhead 13

Optional Point Coordination Function (PCF) Contention-free service uses PCF on a DCF foundation PCF can provided lower transfer delay variations to support time bounded services Async data, voice or mixed implementations are possible Point Coordinator resides in AP Coexistence of contention and optional contention-free does not burden the implementation Contention Free operation Alternating contention-free and contention operation under PCF control NAV prevents contention traffic until reset by the last PCF transfer Thus, variable length of contention-free period per interval Both PCF and DCF defer to each other 14

PCF Burst CF-burst by polling bit set in CF_Down frames Immediate (w/sifs) response by STA on CF_poll STAs to maintain NAV to protect CF_traffic Responses can be of variable length reset NAV by last (CF_End) frame from AP ACK Previous Frame bit in headers Fragment Burst Long MSDU (MAC Service Data Unit) fragmented Burst of fragments are ACKed individually Separated by SIFSs Unicast frames only Random backoff and retransmission of failing fragment when no ACK is returned Can be interrupted Duration information in data fragments and ACKs causes NAV to be set, for medium reservation 15

Frame Formats MAC header format differs per frame type Control frames (several fields are omitted) Management frames Data frames Includes sequence control field for filtering of duplicate caused by ACK and retransmissions Address Fields Description Addr1 all STAs filters on this address Addr2 Transmitter Address (TA) Identifies transmitter to address ACKs to Addr3 Depending on To and From DS bits Addr4 Only needed to identify the original source of WDS (Wireless Distribution System) 16

Privacy and Access Control Goal of 802.11 is to provide Wired Equivalent Privacy (WEP) Provides for an authentication mechanism To aid in access control Has provisions for open, shared key or proprietary authentication extensions Optional (WEP) privacy mechanism defined by 802.11 Limited to STA to STA, not end to end Only implements confidentiality function Uses RC4 PRNG algorithm based on A 40 bit secret key (no key distribution standardized) And a 24 bit IV that is sent with the data Includes an ICV to allow integrity check Only payload of data frames are encrypted On per MPDU basis Privacy Mechanism WEP bit in frame control field indicates WEP in use Each frame can have a new IV or IV can be reused for a limited time If integrity check fails then frame is ACKed but discarded 17

Support for Mobility MAC Management Layer Synchronization Finding and staying with a WLAN Synchronization functions TSF timer, beacon generation Power management Sleeping without missing any message Power management functions Periodic sleep, frame buffering, traffic indication map Association and de-association Joining a network Roaming moving from AP to AP Scanning 18

Synchronization in 802.11 Timing Synchronization Function (TSF) Used for power management Beacons sent at well known intervals All STA timers in BSS are synchronized Used for PCF timing To predict CP/CFP alternation period Used for hop timing for FH PHY Dwell interval STA synchronization Synchronization Approach Each STA maintains a local timer Timing Synchronization Function (TSF) Keeps timers from all STAs in synch AP controls timing in infrastructure mode Distributed function for ad hoc mode Timing conveyed by periodic beacon transmissions Beacons contain timestamps for the BSS Timestamps in beacons used to calibrate local clocks Not required to hear each beacon Beacons contain other management information Also used in power management and roaming 19

Infrastructure Beacon Generation AP s send beacons in infrastructure mode Beacons scheduled at beacon intervals Transmission may be delayed by CSMA deferral Subsequent transmissions at expected beacon interval Not relative to last transmission Next beacon sent at target beacon transmission time Timestamps contains timer values at transmit time Power Management Mobile devices are battery powered Power management is important for mobility Current LAN protocols assume stations are always ready to receive Idle receive state dominates LAN adapter power consumption over time How can we power off during idle periods, yet maintain an active session? 802.11 power management protocol Allows transceivers to be off as much as possible Transparent to existing protocols Flexible to support different applications Possible to trade off throughput for battery life 20

Power Management Approach Allows idle STAs to go to sleep STA s power save mode stored in AP AP buffers packets for sleeping STAs AP announces which STA have frames buffered Traffic Indication Map (TIM) sent with every beacon Power saving STAs wake up periodically Listen for beacons TSF assures AP and power save STAsin synch STAs will wake up to hear a beacon TSF timer keeps running when STAs sleeping Synchronization allows extreme low power consumption IBSS also have power management Similar in concept, distributed approach Infrastructure Power Management Broadcast frames also buffered in AP All broadcasts/multicasts are buffered Broadcasts/multicasts only sent after DTIM Delivery TIM sent every several TIM intervals STAs wakeup prior to an expected (D)TIM If (D)TIM indicates frame buffered STA sends PS_Poll and stays awake for the TIM interval to receive data Else STA sleeps again 21

WLAN Infrastructure Network Each STA is associated with a particular AP STAs 1, 2 and 3 -> A STAs 4 and 5 -> B STAs 6 and 7 -> C Roaming Mobile devices may move 22

Roaming Mobile devices may move Beyond the coverage area of the AP Roaming Mobile devices may move Beyond the coverage area of the AP But within range of another AP 23

Roaming Mobile devices may move Beyond the coverage area of the AP But within range of another AP Re-association allows STA to continue operation Roaming Approach STA decides that link to current AP is too weak STA uses scanning to find another AP Or uses information from previous scans STA sends re-association request to new AP If re-association response successful STA has roamed to new AP Else scans for another AP If AP accepts re-association request AP indicates re-association to the DS DS information is updated Normally old AP is notified through DS 24

Scanning Scanning required for many functions Finding and joining a network Finding a new AP while roaming Initializing an IBSS (ad hoc) network 802.11 MAC uses a common mechanism for all PHY Single/multiple channel Passive/active scanning Passive scanning Find networks simply by listening for beacons Active scanning On each channel, send probe and wait for response Beacon or probe response contains information needed to join the network Roaming Initial connection to an AP 25

Roaming Initial connection to an AP Roaming Initial connection to an AP 26

Roaming Initial connection to an AP Roaming Initial connection to an AP 27

Roaming Initial connection to an AP Re-association follows a similar process MAC Management Frames Beacon Timestamp, beacon interval, capabilities, ESSID, supported rates, parameters TIM Probe ESSID, capabilities, supported rates Probe response Timestamp, beacon interval, capabilities, ESSID, supported rates, parameters Same as beacon except for TIM Association request Capabilities, listen interval, ESSID, supported rates Association response Capabilities, status code, STA ID, supported rates 28

More MAC Management Frames Re-association request capabilities, listen interval, ESSID, supported rates, current AP address Re-association response capabilities, status code, STA ID, supported rates Disassociation Reason code Authentication Algorithm, sequence, status, challenge text De-authentication Reason HIPERLAN & HIPERLAN/2 ETSI s Project BRAN High performance radio LAN Frequency band: 5.2GHz U-NII Ver. 1 (1997): 23.5Mbps Ver. 2 (2000): 54Mbps Components: Distribution System (DS) Access Point (AP) Mobile Terminal (MT) 29

HIPERLAN & HIPERLAN/2 PHY OFDM (like 802.11a and g) MAC TDMA/TDD Under control of an AP or CC (central controller, regular MT acting as AP) Transmission through AP/CC or directly between MT s Better QoS provisioning IEEE 802.15 Working Group Personal Area Network (PAN) Communication within a persons operating space IEEE 802.15.1 Bluetooth IEEE 802.15.3a High data rate (UWB) IEEE 802.15.4 Low energy (ZigBee) (802.15.2 interoperability between 802.15 and 802.11) 30

Bluetooth Originally by Ericsson 1994 Cable replacement Short-range (~m) Low data rate (<1Mbps) Low power (~40mA/0.2mA) Bluetooth Special Interest Group (SIG) 1998 started with 5 companies Ericsson, Nokia, IBM, Toshiba, Intel Now thousands Bluetooth 31

Bluetooth PHY 2.4 GHz ISM band Modulation - GFSK Frequency hopping Over 79 1MHz carriers world wide (except for France, Spain and Japan 23 carriers) 1600/sec (dwell time = 625µs) Long repetition interval of frequencyhop sequence Over 23 hours Piconet Basic Topology Star shape 1 master node controls up to 7 active slave nodes And controls up to 255 parked nodes (in energy save mode) All nodes follow the same hopping sequence as the master 32

Links in Piconet TDD/TDMA SCO synchronous connection oriented Period negotiated with master Supports symmetric, circuit -switched connections Usually for voice ACL asynchronous connectionless Master polls each slave Slave responds immediately Response can take 1, 3, or 5 slots Scatternet Piconets interconnected Slave in multiple piconets Master also a slave Nodes in the same piconet hop with the master Inter-piconet communication not specified in specification 33

IEEE 802.15.3 UWB High data rate WPAN UWB Motivation: The need for higher bandwidths than currently supported by 802.15.1 100 Mpbs within 10 meter 400 Mpbs within 5 meter Data, High quality TV, Home cinema IEEE 802.15.4 & ZigBee Short range <30m Low rate < 250kbps Low power consumption Attractive for sensor networking Frequency Bands of Operation 16 channels in 2.4GHz 10 channels in 915MHz 1 channel in the European 868MHz band 34

Selected Comparisons Standard Bandwidth Power Protocol stack size Stronghold Applications Wi-Fi <=54Mbps 400mA TX 20mA ST 100+KB Data rate Internet, PC networking Bluetooth <1Mbps 40mA TX 0.2mA ST ~100KB Interoperability Cable replacement: wireless USB & headset ZigBee <=250kbps 30mA TX.356mA ST 34KB Low power Sensor networks, remote control IEEE 802.16 WiMAX Broadband MAN IEEE 802.16a Wireless last-mile alternative stationary subscribers, e.g. transceivers mounted on top of business or residential buildings 2-10GHz Supports thousands of users simultaneously TDMA+OFDM / OFDMA IEEE 802.16e Support low speed mobile users 35

IEEE 802.20 Mobile Broadband Supports mobile users at very high speed <= 250 km/hr Operates in licensed 500MHz~3.5GHz band Data rate <= 1Mbps Other Issues and Techniques QoS and fairness Directional antenna and DMAC Multi-channels 36