Wireless Networks. Wireless Links. Mike Freedman hap:// Interference / bit errors

Similar documents
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Last Lecture: Data Link Layer

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless and Mobile Networks 7-2

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 6 Wireless and Mobile Networks

CSC 4900 Computer Networks: Wireless Networks

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Mohammad Hossein Manshaei 1393

Mobile and Sensor Systems

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Multiple Access in Cellular and Systems

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

CSCI-1680 Wireless Chen Avin

COMP 3331/9331: Computer Networks and Applications

CS 332 Computer Networks Wireless Networks

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

Medium Access Control

COMP 3331/9331: Computer Networks and Applications

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Wireless and Mobile Networks

Module 6: Wireless Mobile Networks

M06:Wireless and Mobile Networks. Corinna Schmitt

MULTIPLE ACCESS PROTOCOLS 2. 1

Home Area Networks. Outline

Strengthening Unlicensed Band Wireless Backhaul

MSIT 413: Wireless Technologies Week 8

CSC 8560 Computer Networks: Wireless and Mobility

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network

Wireless Security Background

Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Local Area Networks NETW 901

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind)

Wireless and Mobile Networks

A and C cant see each other, both send to B RTS/CTS can help

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Mobile devices for wireless

Wireless Local Area Networks. Networks: Wireless LANs 1

Announcements: ECE/CS 372 introduction to computer networks. Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Wireless networks. Wireless Network Taxonomy

Block 3: Lecture 1! Part 3: Lecture 1! Wireless networks!

Wireless technology Principles of Security

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Last time?! MPLS! Label distribution protocols! Multi Protocol Label Switching! Layer 2.5 protocol! LDP! RSVP!

Data and Computer Communications. Chapter 13 Wireless LANs

CSCI-1680 Wireless Rodrigo Fonseca

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

UNIT II NETWORKING

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

EE 597: Wireless Networks (Spring 12)

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Wireless LAN. Access Point. Provides network connectivity over wireless media

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Link Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Multiple Access Links and Protocols

Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks

Mohamed Khedr.

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Wireless MACs: MACAW/802.11

Data Communications. Data Link Layer Protocols Wireless LANs

WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS

(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind)

CSE/EE 461 Section 2

CMPE 257: Wireless and Mobile Networking

Wireless Local Area Networks (WLANs) Part I

Links. CS125 - mylinks 1 1/22/14

15-441: Computer Networking. Wireless Networking

CMPE 257: Wireless and Mobile Networking

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

INTRODUCTION TO WIRELESS LAN, MAC PROTOCOLS and INTERFERENCE. Choong Seon Hong, KHU

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

Chapter 5 Wireless and Mobile Networks

Lecture 16: QoS and "

Transcription:

1! Widespread Deployment 2! Wireless Networks COS 461: Computer Networks Spring 2013 Mike Freedman hap://www.cs.princeton.edu/courses/archive/spring13/cos461/ Worldwide cellular subscribers 1993: 34 million 2005: more than 2 billion 2011: close to 6 billion (1.2B with mobile broadband) >> 1.2B landline subscribers Wireless local area networks Wireless adapters built into laptops, tablets, & phones As ubiquitous as broadband subscribers? 600M in 2011 h"p://mobithinking.com/mobile- marke5ng- tools/latest- mobile- stats/a#subscribers 3! Wireless ProperVes 4! Wireless Links Interference / bit errors More sources of corrupvon compared to wired MulVpath propagavon Signal does not travel in a straight line Broadcast medium All traffic to everyone Power trade- offs Important for power constrained devices 1

Wireless Links: High Bit Error Rate 5! Wireless Links: High Bit Error Rate 6! Decreasing signal strength Disperses as it travels greater distance AAenuates as it passes through maaer Interference from other sources Radio sources in same frequency band E.g., 2.4 GHz wireless phone interferes with 802.11b wireless LAN ElectromagneVc noise (e.g., microwave oven) Wireless Links: High Bit Error Rate 7! Dealing With Bit Errors 8! MulV- path propagavon ElectromagneVc waves reflect off objects Taking many paths of different lengths Causing blurring of signal at the receiver receiver! transmitter! Wireless vs. wired links Wired: most loss is due to congesvon Wireless: higher, Vme- varying bit- error rate Dealing with high bit- error rates Sender could increase transmission power Requires more energy (bad for baaery- powered hosts) Creates more interference with other senders Stronger error detecvon and recovery More powerful error detecvon/correcvon codes Link- layer retransmission of corrupted frames 2

Wireless Links: Broadcast LimitaVons 9! Wireless Links: Broadcast LimitaVons 10! Wired broadcast links E.g., Ethernet bridging, in wired LANs Wired broadcast links E.g., Ethernet bridging, in wired LANs All nodes receive transmissions from all other nodes Wireless broadcast: hidden terminal problem All nodes receive transmissions from all other nodes Wireless broadcast: fading over distance A C B A and B hear each other B and C hear each other But, A and C do not So, A and C are unaware of their interference at B A B C A s signal strength C s signal strength A and B hear each other B and C hear each other But, A and C do not So, A and C are unaware of their interference at B space Example Wireless Link Technologies 11! Wireless Network: Wireless Link 12! Data networks 802.15.1 (Bluetooth): 2.1 Mbps 10 m 802.11b (WiFi): 5-11 Mbps 100 m 802.11a and g (WiFi): 54 Mbps 100 m 802.11n (WiFi): 200 Mbps 100 m 802.16 (WiMax): 70 Mbps 10 km Cellular networks, outdoors 2G: 56 Kbps 3G: 384 Kbps 3G enhanced ( 4G ): 4 Mbps LTE network infrastructure Wireless link Typically used to connect mobile(s) to base station Also used as backbone link Multiple access protocol coordinates link access 3

13! Wireless Network: Wireless Hosts 14! Wireless Network: Base StaVon Base station Wireless host Typically connected to wired network Laptop, smartphone Run applications network infrastructure May be stationary (nonmobile) or mobile network infrastructure Relay responsible for sending packets between wired network and wireless host(s) in its area E.g., cell towers, 802.11 access points 15! Wireless Network: Infrastructure 16! Infrastructure Mode (APs) Network infrastructure Infrastructure mode Larger network with which a wireless host wants to communicate Base station connects mobiles into wired network Network provides services (addressing, routing, DNS) Typically a wired network network infrastructure Provides traditional network services May not always exist network infrastructure Handoff: mobile changes base station providing connection to wired network 4

Channels and AssociaVon 17! Channels and AssociaVon 18! MulVple channels at different frequencies Network administrator chooses frequency for AP Interference if channel is same as neighboring AP MulVple channels at different frequencies Network administrator chooses frequency for AP Interference if channel is same as neighboring AP Access points send periodic beacon frames Containing AP s name (SSID) and MAC address Host scans channels, listening for beacon frames Host selects an access point: associavon request/response protocol between host and AP Mobility Within the Same Subnet 19! QuesVons 20! H1 remains in same IP subnet IP address of the host can remain same Ongoing data transfers can convnue uninterrupted H1 recognizes the need to change H1 detects a weakening signal Starts scanning for stronger one Changes APs with same SSID H1 disassociates from one And associates with other Switch learns new locavon Self- learning mechanism BBS 1 AP 1 router hub or switch AP 2 H1 BBS 2 Loss is primary caused by bit errors (A) Ethernet (Wired) (B) 802.11 (Wireless) (C) Both (D) Neither All hosts on subnet see all communicavon (A) Ethernet (Wired) (B) 802.11 (Wireless) (C) Both (D) Neither 5

21! 802.11 LAN Architecture 22! WiFi: 802.11 Wireless LANs BSS 1 AP Internet AP hub, switch or router Access Point (AP) Base station that communicates with the wireless hosts Basic Service Set (BSS) Coverage of one AP AP acts as the master Identified by an network name known as an SSID BSS 2 SSID: Service Set Identifier! CSMA: Carrier Sense, MulVple Access 23! CA: Collision Avoidance, Not DetecVon 24! MulVple access: channel is shared medium StaVon: wireless host or access point MulVple stavons may want to transmit at same Vme Carrier sense: sense channel before sending StaVon doesn t send when channel is busy To prevent collisions with ongoing transfers But, detecvng ongoing transfers isn t always possible Collision detecvon in wired Ethernet StaVon listens while transmimng Detects collision with other transmission Aborts transmission and tries sending again Problem #1: cannot detect all collisions Hidden terminal problem Fading C A B C A B A s signal strength C s signal strength space 6

CA: Collision Avoidance, Not DetecVon 25! Hidden Terminal Problem 26! Collision detecvon in wired Ethernet StaVon listens while transmimng Detects collision with other transmission Aborts transmission and tries sending again A B C Problem #1: cannot detect all collisions Hidden terminal problem Fading Problem #2: listening while sending Strength of received signal is much smaller Expensive to build hardware that detects collisions A and C can t see each other, both send to B Occurs b/c 802.11 relies on physical carrier sensing, which is suscepvble to hidden terminal problem So, 802.11 does collision avoidance, not detecvon Virtual carrier sensing 27! Hidden Terminal Problem 28! First exchange control frames before transmimng data Sender issues Request to Send (RTS), incl. length of data Receiver responds with Clear to Send (CTS) A B C If sender sees CTS, transmits data (of specified length) If other node sees CTS, will idle for specified period If other node sees RTS but not CTS, free to send A and C cant see each other, both send to B RTS/CTS can help Both A and C would send RTS that B would see first B only responds with one CTS (say, echoing A s RTS) C detects that CTS doesn t match and wont send 7

Exposed Terminal Problem 29! Impact on Higher- Layer Protocols 30! A B C D Wireless and mobility change path properves Wireless: higher packet loss, not from congesvon Mobility: transient disrupvons, and changes in RTT B sending to A, C wants to send to D As C receives packets, carrier sense would prevent it from sending to D, even though wouldn t interfere RTS/CTS can help C hears RTS from B, but not CTS from A C knows it s transmission will not interfere with A C is safe to transmit to D Logically, impact should be minimal Best- effort service model remains unchanged TCP and UDP can (and do) run over wireless, mobile But, performance definitely is affected TCP treats packet loss as a sign of congesvon TCP tries to esvmate the RTT to drive retransmissions TCP does not perform well under out- of- order packets Internet not designed with these issues in mind QuesVons 31! 32! RTS/CTS more like: A. StaVsVcal mulvplexing B. Time- division mulvplexing C. Frequency- division mulvplexing Which of following is NOT true? A. Collisions are minimized when RTS/CTS used. B. Sender can always detect a collision without feedback from receiver. C. TCP congesvon control works poorly in wireless without link- layer retransmission. D. Wireless generally has higher loss rates than wired. Bluetooth: 802.15.1 personal- area- networks 8

Bluetooth piconets 33! PHY: Spread Spectrum Frequency Hopping Nodes rapidly jump between frequencies Sender and receiver coordinated in jumps How coordinate? Pseudorandom number generator, with shared input known to sender/receiver If randomly collide with other transmiaed, only for short period before jump again 34! Up to 7 slave devices and 225 parked devices Operates on unlicensed wireless spectrum How to prevent interference? Bluetooth 79 frequencies, on each frequency for 625 microseconds Each channel also uses TDMA, with each frame taking 1/3/5 consecuvve slots. Only master can start in odd slot, slave only in response Ad- Hoc Networks 35! Infrastructure vs. Ad Hoc 36! Ad hoc mode No base stavons Nodes can only transmit to other nodes within link coverage Infrastructure mode Wireless hosts are associated with a base stavon TradiVonal services provided by the connected network E.g., address assignment, rouvng, and DNS resoluvon Nodes self- organize and route among themselves Can create mulv- hop wireless networks, vs. wired backend Ad hoc networks Wireless hosts have no infrastructure to connect to Hosts themselves must provide network services Similar in spirit to the difference between Client- server communicavon Peer- to- peer communicavon 9

Delay Tolerant Networking 37! The Upside to Interference 38! Nodes can both route and store Next hop is available, forward Otherwise, store packets Some systems leverage interference If packets collide once, likely will again Can use both collisions to construct original packets Useful for data collecvon with no Vme limit e.g., sensors in the field Analogous to email Hold onto packets unvl another hop can take it from you Eventually reach its desvnavon Reduce effecvve error rate significantly If two hosts send to each other through an AP, and collide, AP can broadcast collision to both Both know what they sent, can subtract that from collision to get the other Improves throughput of system! Conclusions 39! Wireless Already a major way people connect to the Internet Gradually becoming more than just an access network Mobility (not discussed) Today s users tolerate disrupvons as they move and applicavons try to hide the effects Tomorrow s users expect seamless mobility Challenges the design of network protocols Wireless breaks the abstracvon of a link, and the assumpvon that packet loss implies congesvon Mobility breaks associavon of address and locavon Higher- layer protocols don t perform as well 10