Ethernet. Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff

Similar documents
ICE 1332/0715 Mobile Computing (Summer, 2008)

Communication (III) Kai Huang

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Local Area Networks NETW 901

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Data and Computer Communications. Chapter 13 Wireless LANs

Link Layer: Retransmissions

Medium Access Control

EE 122: Ethernet and

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Lecture Objectives. Lecture 1 Wireless Environment and Wireless LANs. Agenda (1) Agenda (2) Wireless Spectrum (1)

LAN PROTOCOLS. Beulah A AP/CSE

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Wireless Communication and Networking CMPT 371

CSE 461: Multiple Access Networks. This Lecture

Link Layer and Ethernet

Link Layer and Ethernet

Computer Networks. Wireless LANs

Guide to Wireless Communications, Third Edition. Objectives

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Wireless LANs. ITS 413 Internet Technologies and Applications

Data Link Layer, Part 3 Medium Access Control. Preface

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Data Communications. Data Link Layer Protocols Wireless LANs

Wireless# Guide to Wireless Communications. Objectives

Wireless LAN -Architecture

Data Link Layer, Part 5. Medium Access Control

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Medium Access Control Sublayer

MSIT 413: Wireless Technologies Week 8

Medium Access Protocols

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Wireless Communication and Networking CMPT 371

Reliable Transmission

Local Area Networks (LANs) SMU CSE 5344 /

Wireless Communication Session 4 Wi-Fi IEEE standard

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

Internet Structure. network edge:

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Unit II. Part A (2 Marks)

Chapter 6 Medium Access Control Protocols and Local Area Networks

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

ECE 4450:427/527 - Computer Networks Spring 2017

CMPE 257: Wireless and Mobile Networking

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Contention Protocols and Networks

CMPE 257: Wireless and Mobile Networking

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Wireless and Mobile Networks 7-2

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

The Link Layer and LANs. Chapter 6: Link layer and LANs

Chapter 3.1 Acknowledgment:

Transmission Control Protocol over Wireless LAN

Outline: Connecting Many Computers

Part3. Local Area Networks (LAN)

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Summary of MAC protocols

Wireless Communications

Multiple Access Links and Protocols

Direct Link Communication II: Wired Media. Multi-Access Communication

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Housekeeping. Fall /5 CptS/EE 555 1

Chapter 6 Wireless and Mobile Networks

Mobile Communications Chapter 7: Wireless LANs

Mohamed Khedr.

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

CSE 461 Multiple Access. David Wetherall

Data Link Layer -2- Network Access

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

MULTIPLE ACCESS PROTOCOLS 2. 1

Rahman 1. Application

Mohammad Hossein Manshaei 1393

Chapter 4: The Medium Access Layer

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

Long Distance Wireless Communication. Principally satellite communication:

Networking Technologies and Applications

Redes de Computadores. Medium Access Control

Direct Link Communication II: Wired Media. Multi-Access Communication

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Transcription:

Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff

Shared Access Networks are Different Shared Access Networks assume multiple nodes on the same physical link Bus, ring and wireless structures Transmission sent by one node is received by all others No intermediate switches Need methods for moderating access (MAC protocols) Fairness Performance How can this be done? CS 640 2

Multiple Access Methods Fixed assignment Partition channel so each node gets a slice of the bandwidth Essentially circuit switching thus inefficient Examples: TDMA, FDMA, CDMA (all used in wireless/cellular environments) Contention-based Nodes contends equally for bandwidth and recover from collisions Examples: Aloha, Ethernet Token-based or reservation-based Take turns using the channel Examples: Token ring CS 640 3

Coordinated/Fixed sharing approaches

Examples GSM IS136 iden DECT Satellite communications TDMA

TDMA Advantages Active only during own time slot, can do anything else in other time slots Measure the channel, search for other transmitters in different frequencies, etc. Facilities inter-frequency handoffs efficiently (imagine a macrocell and a microcell operating in the same region with different frequencies) Disadvantages Need guard slots to protect between two transmitters (to avoid very tight synchronization) This wastes capacity of the channel

A Quick Word about Token Ring Developed by IBM in early 80 s as a new LAN architecture Consists of nodes connected into a ring (typically via concentrators) Special message called a token is passed around the ring When nodes gets the token it can transmit for a limited time Every node gets an equal opportunity to send IEEE 802.5 standard for Token Ring Designed for predictability, fairness and reliability Originally designed to run at either 4Mbps and 16Mbps Still used and sold but beaten out by Ethernet CS 640 7

Our Focus is Ethernet History Developed by Bob Metcalfe and others at Xerox PARC in mid-1970s Roots in Aloha packet-radio network Standardized by Xerox, DEC, and Intel in 1978 LAN standards define MAC and physical layer connectivity IEEE 802.3 (CSMA/CD - Ethernet) standard originally 2Mbps IEEE 802.3u standard for 100Mbps Ethernet IEEE 802.3z standard for 1,000Mbps Ethernet CSMA/CD: Ethernet s Media Access Control (MAC) policy CS = carrier sense Send only if medium is idle MA = multiple access CD = collision detection Stop sending immediately if collision is detected CS 640 8

Ethernet Standard Defines Physical Layer 802.3 standard defines both MAC and physical layer details Metcalfe s original Ethernet Sketch CS 640 9

Ethernet Technologies: 10Base2 10: 10Mbps; 2: under 185 (~200) meters cable length Thin coaxial cable in a bus topology Repeaters used to connect multiple segments Repeater repeats bits it hears on one interface to its other interfaces: physical layer device only! CS 640 10

10BaseT and 100BaseT 10/100 Mbps rate T stands for Twisted Pair Hub(s) connected by twisted pair facilitate star topology Distance of any node to hub must be < 100M CS 640 11

Physical Layer Configurations for 802.3 Physical layer configurations are specified in three parts Data rate (10, 100, 1,000) 10, 100, 1,000Mbps Signaling method (base, broad) Baseband Digital signaling Broadband Analog signaling Cabling (2, 5, T, F, S, L) 5 - Thick coax (original Ethernet cabling) F Optical fiber S Short wave laser over multimode fiber L Long wave laser over single mode fiber CS 640 12

Ethernet Overview Most popular packet-switched LAN technology Bandwidths: 10Mbps, 100Mbps, 1Gbps Max bus length: 2500m 500m segments with 4 repeaters Bus and Star topologies are used to connect hosts Hosts attach to network via Ethernet transceiver or hub or switch Detects line state and sends/receives signals Hubs are used to facilitate shared connections All hosts on an Ethernet are competing for access to the medium Switches break this model Problem: Distributed algorithm that provides fair access CS 640 13

Ethernet Overview (contd.) Ethernet by definition is a broadcast protocol Any signal can be received by all hosts Switching enables individual hosts to communicate Network layer packets are transmitted over an Ethernet by encapsulating Frame Format 64 48 48 16 32 Preamble Dest addr Src addr Type Body CRC CS 640 14

Switched Ethernet Switches forward and filter frames based on LAN addresses It s not a bus or a router (although simple forwarding tables are maintained) Very scalable Options for many interfaces Full duplex operation (send/receive frames simultaneously) Connect two or more segments by copying data frames between them Switches only copy data when needed key difference from repeaters Higher link bandwidth Collisions are completely avoided Much greater aggregate bandwidth Separate segments can send at once CS 640 15

Ethernet Frames Preamble is a sequence of 7 bytes, each set to 10101010 Used to synchronize receiver before actual data is sent Addresses unique, 48-bit unicast address assigned to each adapter example: 8:0:e4:b1:2 Each manufacturer gets their own address range broadcast: all 1s multicast: first bit is 1 Type field is a demultiplexing key used to determine which higher level protocol the frame should be delivered to Body can contain up to 1500 bytes of data CS 640 16

A Quick Word about Aloha Networks Developed in late 60 s by Norm Abramson at Univ. of Hawaii (!!) for use with packet radio systems Any station can send data at any time Receiver sends an ACK for data Timeout for ACK signals that there was a collision What happens if timeout is poorly timed? If there is a collision, sender will resend data after a random backoff Utilization (fraction of transmitted frames avoiding collision for N nodes) was pretty bad Max utilization = 18% Slotted Aloha (dividing transmit time into windows) helped Max utilization increased to 36% CS 640 17

Ethernet s MAC Algorithm In Aloha, decisions to transmit are made without paying attention to what other nodes might be doing Ethernet uses CSMA/CD listens to line before/during sending If line is idle (no carrier sensed) send packet immediately upper bound message size of 1500 bytes must wait 9.6us between back-to-back frames If line is busy (carrier sensed) wait until idle and transmit packet immediately called 1-persistent sending If collision detected Stop sending and jam signal Try again later CS 640 18

State Diagram for CSMA/CD Packet? No Sense Carrier Send Detect Collision Discard Packet attempts < 16 attempts == 16 Yes Jam channel b=calcbackoff(); wait(b); attempts++; CS 640 19

Collisions Collisions are caused when two adaptors transmit at the same time (adaptors sense collision based on voltage differences) Both found line to be idle Both had been waiting to for a busy line to become idle A starts at time 0 A B A B Message almost there at time T when B starts collision! How can we be sure A knows about the collision? CS 640 20

Collision Detection How can A know that a collision has taken place? There must be a mechanism to insure retransmission on collision A s message reaches B at time T B s message reaches A at time 2T So, A must still be transmitting at 2T IEEE 802.3 specifies max value of 2T to be 51.2us This relates to maximum distance of 2500m between hosts At 10Mbps it takes 0.1us to transmit one bit so 512 bits (64B) take 51.2us to send So, Ethernet frames must be at least 64B long 14B header, 46B data, 4B CRC Padding is used if data is less than 46B Send jamming signal after collision is detected to insure all hosts see collision 48 bit signal CS 640 21

Collision Detection contd. time = 0 A B time = T A B time = 2T A B CS 640 22

Exponential Backoff If a collision is detected, delay and try again Delay time is selected using binary exponential backoff 1st time: choose K from {0,1} then delay = K * 51.2us 2nd time: choose K from {0,1,2,3} then delay = K * 51.2us nth time: delay = K x 51.2us, for K=0..2 n 1 Note max value for k = 1023 give up after several tries (usually 16) Report transmit error to host If delay were not random, then there is a chance that sources would retransmit in lock step Why not just choose from small set for K This works fine for a small number of hosts Large number of nodes would result in more collisions CS 640 23

CSMA/CD CSMA stands for Carrier Sense Multiple Access CD stands for Collision Detection Allows for Retransmission Back-Off 24

MAC Algorithm from the Receiver Side Senders handle all access control Receivers simply read frames with acceptable address Address to host Address to broadcast Address to multicast to which host belongs All frames if host is in promiscuous mode CS 640 25

Fast and Gigabit Ethernet Fast Ethernet (100Mbps) has technology very similar to 10Mbps Ethernet Uses different physical layer encoding (4B5B) Many NIC s are 10/100 capable Can be used at either speed Gigabit Ethernet (1,000Mbps) Compatible with lower speeds Uses standard framing and CSMA/CD algorithm Distances are severely limited Typically used for backbones and inter-router connectivity Becoming cost competitive How much of this bandwidth is realizable? CS 640 26

Experiences with Ethernet Ethernets work best under light loads Utilization over 30% is considered heavy Network capacity is wasted by collisions Most networks are limited to about 200 hosts Specification allows for up to 1024 Most networks are much shorter 5 to 10 microsecond RTT Transport level flow control helps reduce load (number of back to back packets) Ethernet is inexpensive, fast and easy to administer! CS 640 27

Ethernet Problems Ethernet s peak utilization is pretty low (like Aloha) Peak throughput worst with More hosts More collisions needed to identify single sender Smaller packet sizes More frequent arbitration Longer links Collisions take longer to observe, more wasted bandwidth Efficiency is improved by avoiding these conditions CS 640 28

Why did Ethernet Win? There are LOTS of LAN protocols Price Performance Availability Ease of use Scalability CS 640 29

Wireless networking No wires! Shared media Interference and noise Bandwidth and range limits Variable performance Mobility Implications for higher network layers

Wireless Spectrum (1) Broadcast TV VHF: 54 to 88 MHz, 174 to 216 MHz UHF: 470 to 806 MHz 30 MHz 300 MHz 3 GHz 30 GHz FM Radio 88 to 108 MHz Digital TV 54 to 88 MHz, 174 to 216 MHz, 470 to 806 MHz Wireless Environment and Wireless LANs

Wireless Spectrum (2) 3G Broadband Wireless 746-794 MHz, 1.7-1.85 GHz, 2.5-2.7 GHz 30 MHz 300 MHz 3 GHz 30 GHz Cellular Phone 800-900 MHz Personal Communication Service (PCS) 1.85-1.99 GHz Wireless Environment and Wireless LANs

Wireless Spectrum (3) Wireless LAN (IEEE 802.11b/g) 2.4 GHz Wireless LAN (IEEE 802.11a) 5 GHz 30 MHz 300 MHz 3 GHz 30 GHz Bluetooth 2.45 GHz Local Multipoint Distribution Services (LMDS) 27.5-31.3 GHz Wireless Environment and Wireless LANs

Signal attenuation Power Tx Range Detection Interference distance

Signal attenuation A simple model of attenuation in free space Assumes Energy radiates in all directions Consider a sphere (4 *pi *r ^2) Signal attenuates as 1/r^2 SINR = Signal to Interference + Noise Ratio

Passing through a door

Bandwidth, Capacity, Throughput Bandwidth: Width of the channel on which we are operating (units: Hz) WiFi channels are ~20 MHz, or 40 MHz, or 80 MHz TV channels are 6 MHz Bandwidth = Cross section

Bandwidth, Capacity, Throughput Capacity: An ideal notion of (max) rate at which data can be sent across a channel (units: bits/sec) Analogy, capacity of a water pipe = what is the maximum rate at which water can flow through Capacity = Max rate of water flowing through

Bandwidth, Capacity, Throughput Throughput: What is the rate at which data is being sent across the channel (units: bits/sec) Depends on real factors, e.g., amount of interference, signal quality, antenna properties, etc. Analogy, throughput of a water pipe = rate at which water is actually flowing through it, which depends on blockages inside and other factors Thruput = how much Water Actually

Channel capacity Shannon law C = B log (1 + SINR) SINR: Signal to Interference + Noise Ratio S: Received power of signal at the receiver I: Interference power N: Noise power

Units dor SINR (or SNR)? SINR is a ratio, so unitless However, we commonly use a unit Bels (or decibels) to refer to SINR or SNR values SINR (in Bels) = log_10 (actual SINR value) SINR (in decibels) = 10 log_10 (actual SINR value)

db db = decibels dbm = 10 log10 (power in mw) dbw = 10 log10 (power in W) Express 1 W in dbw and dbm Express 1 mw in dbw and dbm Expres 10 mw in dbw and dbm

Some values for SNR 802.11a/n, Tx power = 40 mw = 14 dbm 802.11b, Tx power = 100 mw = 20 dbm 802.11g, Tx power = 50 mw = 17 dbm Free space loss 100m ~ 80 db Tx power + antenna gain = EIRP (17 dbm) + (6 dbi) = (23 dbm) Received signal 23 80 = -57 dbm If noise = -95 dbm, then SNR = -57+95 = 38 db

Channel capacity C = B log (1 + ) How to increase it? Increase B Increase S Power Increase transmit power Reduce receiver distance distance

Efficiency of a wireless system Spectral efficiency --- throughput per unit frequency : units of b/s/hz A good way to compare technologies Check http://en.wikipedia.org/wiki/spectral_efficiency for some example spectral efficiencies

Example 1 Consider an extremely noisy channel in which the value of the signal-to-noise ratio is almost zero. In other words, the noise is so strong that the signal is faint. For this channel the capacity C is calculated as This means that the capacity of this channel is zero regardless of the bandwidth. In other words, we cannot receive any data through this channel.

Example 2 We can calculate the theoretical highest bit rate of a regular telephone line. A telephone line normally has a bandwidth of 3000 Hz. The signal-to-noise ratio is usually 3162. For this channel the capacity is calculated as This means that the highest bit rate for a telephone line is 34.860 kbps. If we want to send data faster than this, we can either increase the bandwidth of the line or improve the signal-to-noise ratio.

Example 3 The signal-to-noise ratio is often given in decibels. Assume that SNR db = 36 and the channel bandwidth is 2 MHz. The theoretical channel capacity can be calculated as

Example 4 For practical purposes, when the SNR is very high, we can assume that SNR + 1 is almost the same as SNR. In these cases, the theoretical channel capacity can be simplified to For example, we can calculate the theoretical capacity of the previous example as

Example 5 We have a channel with a 1-MHz bandwidth. The SNR for this channel is 63. What is the appropriate bit rate? Solution We use the Shannon formula to find the upper limit.

IEEE 802.11 Characteristics Modes of operation Association, authentication and privacy

IEEE 802.11 Standard Final draft approved in 1997 Operates in the 2.4 GHz industrial, scientific and medical (ISM) band Standard defines the physical (PHY) and medium access control (MAC) layers Note that the 802.11 MAC layer also performs functions that we usually associated with higher layers (e.g., fragmentation, error recovery, mobility management) Initially defined for operation at 1 and 2 Mbps DSSS, FHSS or infrared Extensions (IEEE 802.11b, IEEE 802.11a, etc.) allow for operation at higher data rates and (in the case of 802.11a) different frequency bands Wireless Environment and Wireless LANs

Reference Model (1) Data Link Layer Physical Layer Medium Access Control MAC sublayer (MAC) sublayer management Physical Layer convergence procedure (PLCP) sublayer Physical medium Dependent (PMD) sublayer PHY sublayer management station management Wireless Environment and Wireless LANs

Reference Model (2) Physical Medium Dependent (PMD) sublayer Defines a method for transmitting and receiving data through the medium, including modulation and coding Dependent on whether DSSS, FHSS or IR is used Physical Layer Convergence Procedure (PLCP) sublayer Maps MAC layer PDUs into a packet suitable for transmission by the PMD sublayer Performs carrier sensing MAC sublayer Defines access mechanism, based on CSMA Performs fragmentation and encryption of data packets Wireless Environment and Wireless LANs

IEEE 802.11b Standard released in 1999 2.4 2.483 GHz band Uses DSSS Data rates of up to 11 Mbps Data rates are automatically adjusted for noisy conditions, so can operate at 1, 2, 5.5 or 11 Mbps Modes of operation Infrastructure-based Ad-hoc Wireless Environment and Wireless LANs

Infrastructure Mode (1) Access Point Wired LAN Basic Service Set (BSS) Access point serves as a local bridge Stations communicate through the access point, which relays frames to/from mobile stations Wireless Environment and Wireless LANs Mobile Stations

Infrastructure Mode (2) Access Points Wired LAN Extended Service Set (ESS) A set of infrastructure BSSs Access points communicate among themselves to forward frames between BSSs and to facilitate movement of stations between BSSs Wireless Environment and Wireless LANs Mobile Stations

Ad Hoc Mode Server Independent Basic Service Set (IBSS) or Peer to Peer Stations communicate directly with each other When no direct link is feasible between two station, a third station may act as a relay (multi-hop communications) Wireless Environment and Wireless LANs Mobile Stations

Distribution Systems The architectural component used to interconnect BSSs is the distribution system (DS) DS enable mobile device support Address-to-destination mapping Seamless integration of several BSSs In practice, an access point implements DS services Wireless Environment and Wireless LANs

STA 1 Distribution Systems and Access Points BSS 1 ESS STA 2 AP DS BSS 2 STA 3 AP STA 4 Wireless Environment and Wireless LANs

Integration with Wired LANs STA 1 BSS 1 STA 2 AP DS IEEE 802.x LAN Portal STA 3 BSS 2 AP STA 4 Wireless Environment and Wireless LANs

Authentication

Association To deliver a message within the DS, must know which AP to access for a given mobile station Before a station is allowed to send a message through an AP, it must associate itself with that AP At any given time, a station must be associated with no more than one AP An AP may be associated with multiple stations As it moves between BSSs, a mobile station may reassociate itself with a different AP Wireless Environment and Wireless LANs

Authentication 802.11 provides link-level authentication between stations 802.11 also supports shared key authentication Requires that wired equivalent privacy (WEP) be enabled Identity is demonstrated by knowledge of a shared, secret, WEP encryption key Typically, authentication is performed at association with an AP Wireless Environment and Wireless LANs

Channel contention (Medium Access)

MAC in Detail Channel access mechanism Distributed Coordination Function (DCF) Carrier sense multiple access (CSMA) with immediate MAClevel ACK RTS/CTS(4-way handshaking) exchange (optional) RTS stands for Request-to-Send CTS stands for Clear-to-Send Point Coordination Function (PCF) Polled access through AP and distributed access Contention-free period (CFP) and contention period (CP) Seldom implemented in practice 67 Slide taken from: http://www.cse.ucsc.edu/classes/cmpe257/spring05/lecture/lecture3.pdf#search='802.11e%20mac%20protocol%2c%20powerpoint

Channel contention (CSMA/CA)

Inter-frame spacing

802.11 channels 11 channels in 2.4 GHz (in the US) More channels in 5 GHz (only some shown)

802.11 PHY rates (From Cisco docs) PHY rate depends on SNR (which often depends on distance from transmitter)

How to cover a space

Cellular vs WiFi Cost: Expensive licensed spectrum Range: 1 to 20 km Tx power: 1-10 W Protocols: Highly coordinated Throughputs: ~ 10 Kbps 2 Mbps Cost: Cheap and unlicensed use Range: ~100 m Tx power: ~0.1 W Protocols: Uncoordinated Throughputs: ~ 1 Mbps 100 Mbps

Cellular network planning Ideal - Hexagonal patterns» In real life Macro and Microcells

Spatial re-use Macrocell vs Microcell vs Pico/Femtocells