Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Similar documents
Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Wireless LANs. ITS 413 Internet Technologies and Applications

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Chapter 6 Medium Access Control Protocols and Local Area Networks

Data and Computer Communications. Chapter 13 Wireless LANs

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

ICE 1332/0715 Mobile Computing (Summer, 2008)

Computer Networks. Wireless LANs

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Lesson 2-3: The IEEE x MAC Layer

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Lecture 16: QoS and "

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Introduction to IEEE

Wireless Local Area Networks (WLANs) Part I

Mobile Communications Chapter 7: Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs

Local Area Networks NETW 901

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

CHAPTER 8: LAN Standards

IEEE Technical Tutorial. Introduction. IEEE Architecture

MAC. Fall Data Communications II 1

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Unit 7 Media Access Control (MAC)

Mohamed Khedr.

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Medium Access Control Sublayer

Chapter 6 Wireless and Mobile Networks

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Mobile Communications Chapter 7: Wireless LANs

Multiple Access Links and Protocols

IEEE Wireless LANs Part I: Basics

IEEE MAC Sublayer (Based on IEEE )

Multiple Access in Cellular and Systems

Wireless Local Area Networks. Networks: Wireless LANs 1

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Communications

CSE 461: Wireless Networks

Wireless Local Area Network (IEEE )

Advanced Computer Networks WLAN

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Guide to Wireless Communications, Third Edition. Objectives

Wireless Networking & Mobile Computing

Lecture (08) Wireless Traffic Flow and AP Discovery

Introduction. Giuseppe Bianchi, Ilenia Tinnirello

IEEE Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Protocols. Training materials for wireless trainers

Nomadic Communications WLAN MAC Fundamentals

Wireless# Guide to Wireless Communications. Objectives

Wireless Communication and Networking CMPT 371

CMPE 257: Wireless and Mobile Networking

MSIT 413: Wireless Technologies Week 8

Wireless Communication and Networking CMPT 371

MAC in /20/06

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Mohammad Hossein Manshaei 1393

Chapter 12 Multiple Access 12.1

Wireless LAN -Architecture

IEEE WLAN (802.11) Copyright. Nomadic Communications

Mohammad Hossein Manshaei 1393

Data and Computer Communications

Computer Communication III

Transmission Control Protocol over Wireless LAN

Investigation of WLAN

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

MAC. OSI Layer 2 (Data Link) OSI Layer 1 (Physical)

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

Wireless and Mobile Networks 7-2

1. Data Link Layer Protocols

Wireless Communication Session 4 Wi-Fi IEEE standard

Wireless and Mobile Networks

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

3.1. Introduction to WLAN IEEE

Solutions to Exercise Session 4,

CSE 461: Multiple Access Networks. This Lecture

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Internet Protocol Stack

Master thesis 60 credits

Mobile Communications Chapter 7: Wireless LANs

Wireless Networks (MAC)

Chapter 7: Wireless LANs

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

15-441: Computer Networking. Wireless Networking

Hands-On Exercises: IEEE Standard

Medium Access Control Sublayer Chapter 4

Wireless LANs. Outline. Outline II. Benefits Applications Technologies Issues Configurations Overview of Standard

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

Transcription:

Outline 18-759 : Wireless s Lecture 11: 80.11 Peter Steenkiste Dina Papagiannaki Spring Semester 009 http://www.cs.cmu.edu/~prs/wireless09/ Peter A. Steenkiste, CMU 1 80 protocol overview Wireless LANs 80.11 Personal Area s 80.15 Wireless Access 80.16 Cellular networks Peter A. Steenkiste, CMU History Standardization of Wireless s Aloha wireless data network Car phones» Big and heavy portable phones» Limited battery life time» But introduced d people to mobile networking» Later turned into truly portable cell phones Wireless LANs» Originally in the 900 MHz band» Later evolved into the 80.11 standard» Later joined by the 80.15 and 80.16 standards Cellular data networking» Data networking over the cell phone» Many standards throughput is the challenge Peter A. Steenkiste, CMU 3 ISO OSI 7-layer model Wireless networks are standardized by IEEE Under 80 LAN MAN standards committee Application Presentation Session Transport Data Link Physical IEEE 80 standards Logical Link Control Medium Access () Physical (PHY) Peter A. Steenkiste, CMU 4 Frequency Bands The 80 Class of Standards Industrial, Scientific, and Medical (ISM) bands Unlicensed, MHz channel bandwidth Audio Extremely Very Low Low Low Short Wave Radio AM Broadcast Medium High Very Ultra High High FM Broadcast Television Infrared wireless LAN Cellular (840MHz) NPCS (1.9GHz) Super High Infrared Visible Ultraviolet X-Rays Light List on next slide Some standards apply to all 80 technologies» E.g. 80. is LLC» Important for inter operability Some standards are for technologies that are outdated» Not actively deployed anymore» E.g. 80.6 90-98 MHz 6 MHz.4 -.4835 GHz 83.5 MHz (IEEE 80.11) 5 GHz (IEEE 80.11) HyperLAN HyperLAN Peter A. Steenkiste, CMU 5 Peter A. Steenkiste, CMU 6 Page 1

80.1 Overview Document Containing the Reference Model, Tutorial, and Glossary 80.1 b Specification for LAN Traffic Prioritization 80.1 q Virtual Bridged LANs 80. Logical Link Control 80.3 Contention Bus Standard 1 Obase 5 (Thick Net)» 80.3a Contention Bus Standard 10base (Thin Net)» 80.3b Broadband Contention Bus Standard 10broad 36» 80.3d Fiber-Optic InterRepeater Link (FOIRL)» 80.3e Contention Bus Standard 1 base 5 (Starlan)» 80.3i Twisted-Pair Standard 10base T» 80.3j Contention Bus Standard for Fiber Optics 10base F» 80.3u 100-Mb/s Contention Bus Standard 100base T» 80.3x Full-Duplex Ethernet» 80.3z Gigabit Ethernet» 80.3ab Gigabit Ethernet over Category 5 UTP 80.4 Token Bus Standard 80.5 Token Ring Standard» 80.5b Token Ring Standard 4 Mb/s over Unshielded Twisted-Pair» 80.5f Token Ring Standard 16-Mb/s Operation 80.6 Metropolitan Area DQDB 80.7 Broadband LAN Recommended Practices 80.8 Fiber-Optic Contention Practices 80.9a Integrated Voice and Data LAN 80.10 Interoperable LAN Security 80.11 Wireless LAN Standard 80.1 Contention Bus Standard 1 OOVG AnyLAN 80.15 Wireless Personal Area Peter A. Steenkiste, 80.16 CMU Wireless MAN Standard 7 IEEE 80.11 Organization Tree IEEE 80.11 Working Group PHYS Layer Layer Infra-Red (IR).4 GHz (FHSS).4 GHz (SS) 5 GHz (OFDM) 80.11 80.11 IR 80.11 FHSS 80.11 SS 80.11a 80.11e 1 / Mbit/s 1 / Mbit/s 1 / Mbit/s 6 / 1 / 4 Mbit/s Enhancements Optional 9/18/36/54 Mbit/s 80.11b High Data Rate Extension Security 5.5 / 11 Mbit/s QOS 80.11g Data Rates > 0 Mbit/s Peter A. Steenkiste, CMU 8 Outline IEEE 80.11 Overview 80 protocol overview Wireless LANs 80.11» Overview of 80.11» 80.11, frame format, operations» 80.11 management» 80.11*» Deployment example Wireless Access 80.16 Personal Area s 80.15 Cellular technologies Adopted in 1997 with goal of providing» Access to services in wired networks» High throughput» Highly reliable data delivery» Continuous network connection, e.g. while mobile The protocol defines» sublayer» management protocols and services» Several physical (PHY) layers: IR, FHSS, SS, OFDM Wi-Fi Alliance is industry group that certifies interoperability of 80.11 products Peter A. Steenkiste, CMU 9 Peter A. Steenkiste, CMU 10 Infrastructure and Ad Hoc Mode 80.11 Architecture Infrastructure mode: stations communicate with one or more access points which are connected to the wired infrastructure» What is deployed in practice Two modes of operation:» Distributed Control Functions - DCF Our Focus» Point Control Functions PCF» PCF is rarely used - inefficient Alternative is ad hoc mode: multi-hop, assumes no infrastructure» Rarely used, e.g. military» Hot research topic! Peter A. Steenkiste, CMU 11 Infrastructure Ad Hoc AP : Basic Service Set ESS: Extended Service Set ESS Existing Wired LAN AP Peter A. Steenkiste, CMU 1 Ad Hoc Page

Terminology for DCF Features of 80.11 protocol Stations and access points - Basic Service Set» One access point that provides access to wired infrastructure» Infrastructure ESS - Extended Service Set» A set of infrastructure s that work together» APs are connected to the same infrastructure» Tracking of mobility Distribution System» AP communicates with each other» Thin layer between LLC and sublayers Supports functionality» ing» CSMA/CA Error detection (FCS) Error correction (ACK frame) Flow control: stop-and-wait Fragmentation (More Frag) Collision Avoidance (RTS-CTS) Peter A. Steenkiste, CMU 13 Peter A. Steenkiste, CMU 14 Carrier Sense Multiple Access DCF mode transmission without RTS/CTS Before transmitting a packet, sense carrier If it is idle, send» After waiting for one DCF inter frame spacing (DIFS) If it is busy, then» Wait for medium to be idle for a DIFS (DCF IFS) period» Go through exponential backoff, then send» Want to avoid that several stations waiting to transmit automatically collide Wait for ack» If there is one, you are done» If there isn t one, assume there was a collision, retransmit using exponential backoff DIFS source destination other Data NAV SIFS Ack Must defer access DIFS CW Random backoff Peter A. Steenkiste, CMU 15 Peter A. Steenkiste, CMU 16 Exponential Backoff Collision Avoidance Force stations to wait for random amount of time to reduce the chance of collision» Backoff period increases exponential after each collision» Similar to Ethernet If the medium is sensed it is busy:» Wait for medium to be idle for a DIFS (DCF IFS) period» Pick random number in contention window (CW) = backoff counter» Decrement backoff timer until it reaches 0 But freeze counter whenever medium becomes busy» When counter reaches 0, transmit frame» If two stations have their timers reach 0; collision will occur; After every failed retransmission attempt:» increase the contention window exponentially» i 1 starting with CW min up to CW max e.g., 7, 15, 31, Peter A. Steenkiste, CMU 17 Difficult to detect collisions in a radio environment» While transmitting, a station cannot distinguish incoming weak signals from noise its own signal is too strong Why do collisions happen?» Near simultaneous transmissions Period of vulnerability: propagation delay» Hidden node situation: two transmitters cannot hear each other and their transmission overlap at a receiver S1 CTS RTS R1 Peter A. Steenkiste, CMU 18 CTS S Page 3

Request-to-Send and Clear-to-Send Virtual Carrier Sense Before sending a packet, first send a station first sends a RTS» Collisions can still occur but chance is relatively small since RTS packets are short The receiving station responds with a CTS» Tells the sender that it is ok to proceed RTS and CTS use shorter IFS to guarantee access» Effectively priority over data packets First introduced in the Multiple Access with Collision Avoidance (A) protocol» Fixed problems observed in Aloha Peter A. Steenkiste, CMU 19 RTS and CTS notify nodes within range of sender and receiver of upcoming transmission Stations that hear either the RTS or the CTS remember that the medium will be busy for the duration of the transmission» Based on a Duration ID in the RTS and CTS» Note that they may not be able to hear the packet! Virtual Carrier Sensing: stations maintain Allocation Vector (NAV)» Time that must elapse before a station can sample channel for idle status» Consider the medium to be busy even if it cannot sense a signal Peter A. Steenkiste, CMU 0 Use of RTS/CTS Some More Features Use of RTS/CTS is controlled by an RTS threshold» RTS/CTS is only used for data packets longer than the RTS threshold» Pointless to use RTS/CTS for short data packets high overhead! Number of retries is limited by a Retry Counter» Short retry counter: for packets shorter than RTS threshold» Long retry counter: for packets longer than RTS threshold Packets can be fragmented.» Each fragment is acknowledged» But all fragments are sent in one sequence» Sending shorter frames can reduce impact of bit errors» Lifetime timer: maximum time for all fragments of frame Peter A. Steenkiste, CMU 1 Peter A. Steenkiste, CMU Now What about PCF? IEEE 80.11 combines random access with a taking turns protocol» DCF (Distributed Coordination Mode) Random access CP (Contention Period): CSMA/CA is used» PCF (Point Coordination Mode) Polling CFP (Contention-Free Period): AP polls hosts CFP CP Super-frame Extend CP Frame CFP Shortened CFP Peter A. Steenkiste, CMU 3 Playing Games with Inter Frame Spacing Assigning different IFS effectively provides a mechanism for prioritizing packets and events SIFS - short IFS: for high priority transmissions PIFS PCF IFS: used by PCF during contention-free period DIFS DCF IFS: used for contention-based services EIFS extended IFS: used when there is an error IFS Peter A. Steenkiste, CMU 4 Page 4

Effect of Different IFS PCF Operation Overview PCF transmissions effectively get priority over DCF transmission because they use a shorter IFS Peter A. Steenkiste, CMU 5 PC Point Coordinator» Uses polling eliminates contention» Polling list ensures access to all registered stations» Over DCF but uses a PIFS instead of a DIFS gets priority CFP Contention Free Period» Alternate with DCF Periodic Beacon contains length of CFP» NAV prevents transmission during CFP» CF-End resets NAV CF-Poll Contention Free Poll by PC» Stations can return data and indicate whether they have more data» CF-ACK and CF-POLL can be piggybacked on data Peter A. Steenkiste, CMU 6 And What about Ad Hoc? Infrastructure mode: access points relay packets» Based on an Infrastructure» APs are connected through a distribution system Ad-hoc mode: no fixed network infrastructure» Based on an Independent» A wireless endpoint sends and all nodes within range can pick up signal» Each packet carries destination and source address» Effectively need to implement a network layer How do know who is in the network? Routing? Security?» Research area discussed later in the course Peter A. Steenkiste, CMU 7 NAV information Or Short Id for PS-Poll Frame Format Upper layer data 048 byte max 56 upper layer header Duration Sequence FC DATA FCS /ID 1 3 Control 4 6 6 6 6 0-31 4 bytes Protocol Version Frame Type and Sub Type To and From More Fragments Retry Power Management More Data WEP Order IEEE 48 bit address Individual/Group Universal/Local 46 bit address ID Identifier TA - Transmitter RA - Receiver SA - Source DA - Destination MSDU Sequence Number Fragment Number CCIT CRC-3 Polynomial Source and destination address: final source/dest for the packet Receiver and transmitter address: nodes wireless nodes that tr/rec packet Peter A. Steenkiste, CMU 8 Detailed 80.11 Frame Format Packet Types bytes Frame control Protocol version Duration/ ID header 1 Type Sub-type To 6 6 6 From 3 More Frag Seq. control Retry 6 4 Pwr Mgmt More Data 0-31 Frame body WEP Order bits 4 1 1 1 1 1 1 1 1 4 FCS Type/sub-type field is used to indicate the type of the frame Management:» Association/Authentication/Beacon Control» RTS, CTS, CF-end, ACK Data» Data only, or Data + CF-ACK, or Data + CF-Poll or Data + CF-Poll + CF-ACK Peter A. Steenkiste, CMU 9 Peter A. Steenkiste, CMU 30 Page 5

ing Fields Some More Fields To From 0 0 station-to-station frames in an I; all mgmt/control frames Message 1 3 4 DA SA ID N/A 0 1 From AP to station ti DA ID SA N/A 1 0 From station to AP ID SA DA N/A 1 1 From one AP to another in RA TA DA SA same RA: Receiver TA: Transmitter DA: Destination SA: Source ID: address of AP in an infrastructure Duration/ID: Duration in DCF mode/id is used in PCF mode More Frag: 80.11 supports fragmentation of data More Data: In polling mode, station indicates it has more data to send when replying to CF- POLL RETRY is 1 if frame is a retransmission; WEP (Wired Equivalent Privacy) Power Mgmt is 1 if in Power Save Mode; Order = 1 for strictly ordered service Peter A. Steenkiste, CMU 31 Peter A. Steenkiste, CMU 3 Multi-bit Rate Long Preamble 80.11 allows for multiple bit rates» Allows for adaptation to channel conditions» Specific rates dependent on the version Algorithm for selecting the rate is not defined by the standard left to vendors» Still a research topic!» More later in the semester Packets have multi-rate format» Different parts of the packet are sent at different rates» Why? Long Preamble = 144 bits Interoperable with older 80.11 devices Entire Preamble and 48 bit PLCP Header sent at 1 Mbps 18 bit Preamble (Long) Transmitted at 1 Mbps Start Frame Delimiter Signal Speed 1,,5.5, 11 Mbps Service (unused) Length of CRC 0-31 bytes Transmitted at X Mbps Peter A. Steenkiste, CMU 33 Peter A. Steenkiste, CMU 34 Short Preamble Data Flow Examples Short Preamble = 7 bits Preamble transmitted at 1 Mbps PLCP Header transmitted at Mbps more efficient than long preamble Transmitted at 1 Mbps 56 bit Preamble Start Frame Delimiter Signal Speed 1,,5.5, 11 Mbps Transmitted at Mbps Service (unused) Length of CRC Transmitted at X Mbps 0-31 bytes Case 1: Packet from a station under one AP to another in same AP s coverage area Case : Packet between stations in an I Case 3: Packet from an 80.11 station to a wired server on the Internet Case 4: Packet from an Internet server to an 80.11 station Peter A. Steenkiste, CMU 35 Peter A. Steenkiste, CMU 36 Page 6

Case 1: Communication Inside Case : Ad Hoc To :1 A From :1 B ethernet 18.38.36 C AP knows which stations are registered with it so it knows when it can send frame directly to the destination R Internet Server A To :0 From :0 B Direct transmit only in I (Independent ), i.e., without AP Note: in infrastructure mode (i.e., when AP is present), even if B can hear A, A sends the frame to the AP, and AP relays it to B Peter A. Steenkiste, CMU 37 Peter A. Steenkiste, CMU 38 To :1 A Case 3: To the Internet B ethernet 18.38.36 C A determines IP address of the server (using DNS) From the IP address, it determines that server is in a different subnet Hence it sets R as DA;» 1: ID, : A; 3: DA AP will look at the DA address and send it on the ethernet» AP is an 80.11 to ethernet bridge Router R will relay it to server R Internet Server Peter A. Steenkiste, CMU 39 Case 4: From Internet to Station ARP 18.38.36.5 Dest: I ethernet ARP reply 18.38.36 D: A; S: R R R Internet II A B 18.38.36.638 36 6 18.38.36.5 C 18.38.36.7 Server Packet arrives at router R uses ARP to resolve destination IP address» AP knows nothing about IP addresses, so it will simply broadcast ARP on its wireless link» DA = all ones broadcast address on the ARP A host replies with its address (ARP reply)» AP passes on reply to router Router sends data packet, which the AP simply forwards because it knows that A is registered Will AP II broadcast the ARP request on the wireless medium? How about the data packet? Peter A. Steenkiste, CMU 40 Page 7