Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Similar documents
Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

ECE 4450:427/527 - Computer Networks Spring 2017

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EE 122: Ethernet and

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

CSC 4900 Computer Networks: Wireless Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Wireless and Mobile Networks 7-2

Chapter 6 Wireless and Mobile Networks

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Mohammad Hossein Manshaei 1393

Medium Access Control

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Mobile and Sensor Systems

Reliable Transmission

CS 332 Computer Networks Wireless Networks

CMPE 344 Computer Networks Spring Getting Connected. Reading: Peterson and Davie, 2.1,

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

Last Lecture: Data Link Layer

Ethernet and WiFi. h-p://xkcd.com/466/

128 CHAPTER 2 Getting connected 2.7 WIRELESS

LAN PROTOCOLS. Beulah A AP/CSE

MULTIPLE ACCESS PROTOCOLS 2. 1

Wireless Networks. Wireless Links. Mike Freedman hap:// Interference / bit errors

Medium Access Control Sublayer Chapter 4

CMPE 344 Computer Networks Spring Getting Connected. Reading: Peterson and Davie, 2.1,

Data Link Layer, Part 3 Medium Access Control. Preface

Wireless and Mobile Networks

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

CSE 461: Multiple Access Networks. This Lecture

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

COMP 3331/9331: Computer Networks and Applications

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Data Link Layer, Part 5. Medium Access Control

Networking Technologies and Applications

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Chapter 10: Wireless LAN & VLANs

Computer Networks. Medium Access Sublayer (Part I)

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

COMP 3331/9331: Computer Networks and Applications

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

MSIT 413: Wireless Technologies Week 8

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

Summary of MAC protocols

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CMPE 257: Wireless and Mobile Networking

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network

Home Area Networks. Outline

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Introduction to Computer Networks. IEEE Ethernet

Protocols for Multiaccess Networks

Contention Protocols and Networks

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Ethernet. Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff

Copyright 2010, Elsevier Inc. All rights Reserved

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Link Layer. (continued)

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Link Layer: Retransmissions

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Spring Ethernet

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

COMP/ELEC 429/556 Introduction to Computer Networks

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Link Layer I: ALOHA, Time-, Frequency-, and Code Division. COS 463: Wireless Networks Lecture 4 Kyle Jamieson

Multiple Access in Cellular and Systems

Wireless Local Area Networks. Networks: Wireless LANs 1

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

CSCI-1680 Wireless Chen Avin

Ethernet. Networks: Ethernet 1

Wireless networks. Wireless Network Taxonomy

ECE 158A: Lecture 13. Fall 2015

Module 6: Wireless Mobile Networks

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

IEEE Technical Tutorial. Introduction. IEEE Architecture

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Link Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

6th Slide Set Computer Networks

Unit II. Part A (2 Marks)

IEEE 802 LANs SECTION C

WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS

Transcription:

Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting 2.2 Encoding 2.3 Framing 2.4 Error Detection 2.5 Reliable Transmission 2.6 Ethernet 2.7 Wireless 2.8 Summary Tuesday, September 13 CS 475 Networks - Lecture 6 2

Ethernet Ethernet is the overwhelmingly most successful local area networking technology. Ethernet is a working example of carrier sense, multiple access with collision detection (CSMA/CD) technology. Ethernet was developed by Xerox and is based on the Aloha packet-radio network once used at the University of Hawaii. Ethernet was standardized as IEEE 802.3 Tuesday, September 13 CS 475 Networks - Lecture 6 3

Ethernet - Physical Properties Original Ethernet (thick-net) used 10Base5 (10 Mbps/Baseband/500 m link) signaling. Multiple hosts could be connected to the same cable and any signal was received by all hosts. Fig 2.22 Ethernet transceiver and adaptor Thin-net used 10Base2 (200 m). Twisted pair uses 10/100BaseT (100 m) and CAT5 cable. Tuesday, September 13 CS 475 Networks - Lecture 6 4

Ethernet - Physical Properties Multiple thick-net segments could be joined together with (no more than 4) repeaters for a total reach of 2500 m. Fig. 2.23 Ethernet repeater Thin-net segments could be joined similarly. Tuesday, September 13 CS 475 Networks - Lecture 6 5

Ethernet - Physical Properties Fig. 2.24 Ethernet hub With 10/100BaseT a hub (multiway repeater) is used to connect hosts and segments. All hosts on segments connected by hubs or repeaters are in the same collision domain. Tuesday, September 13 CS 475 Networks - Lecture 6 6

Access Protocol - Frame Format An Ethernet frame has a 64 bit preamble of alternating 0s and 1s that are used for synch. Ethernet (MAC) addresses are 48 bits. Each adaptor has a unique address. The type field is used for demuxing higher protocols. Each frame contains at least 46 bytes of data (64 total) and no more than 1500 bytes. A 32 bit CRC is included in each frame. Tuesday, September 13 CS 475 Networks - Lecture 6 7

Access Protocol - Addresses Addresses are 48 bits (6 bytes). They are typically printed in hex with colons separating the bytes (8:0:2b:e4:b1:2). Manufacturers have their own prefix to ensure that each adaptor has a unique address. A frame with a destination address of all 1s is a broadcast frame. A destination address with a leading 1 (but not a broadcast address) is a multicast frame. Tuesday, September 13 CS 475 Networks - Lecture 6 8

Access Protocol - Transmitter Algorithm When an adaptor has a frame to send and it senses that the line is idle, it transmits the frame immediately. If the line is busy, it waits for the line to go idle and then transmits the frame. Due to propagation delays, collisions can occur. When an adaptor detects that a frame it sent has collided with another frame it stops transmitting and immediately transmits a 32 bit jamming sequence. Tuesday, September 13 CS 475 Networks - Lecture 6 9

Access Protocol - Transmitter Algorithm In the worst case, A and B are widely separated and B starts transmitting just as A's frame reaches B. A's frame must be at least 2 x 2500 m / 3 x 10 8 m/s = 16.67 μs long in order to detect the collision. Ethernet specifies a min. length of 51.2 μs (512 bits or 64 bytes at 10 Mbps.) Fig. 2.26 Worst-case collision scenario Tuesday, September 13 CS 475 Networks - Lecture 6 10

Access Protocol - Transmitter Algorithm Once a collision has been detected the adaptor waits before transmitting the frame again. Exponential backoff is used. It firsts waits either (randomly) 0 or 51.2 μs. If there is another collision it waits either 0, 51.2, 102.4 or 153.6 μs and so on. In general, a k value is randomly selected between 0 and 2 n 1 (n is the number of collisions). The adaptor waits k x 51.2 μs. Adaptors usually give up after 16 tries and report an error to the host. Tuesday, September 13 CS 475 Networks - Lecture 6 11

Experience with Ethernet Multi-access Ethernet has been used primarily in situations where there are fewer than 200 hosts and distances in the 100s of meters, since collisions waste network capacity. E.g. in a room to a hub connected to switch in a wiring closet. Tuesday, September 13 CS 475 Networks - Lecture 6 12

Experience with Ethernet Ethernet characteristics that made it successful Original Ethernet easy to administer and maintain - no switches, no configuration tables, just add a tap to the network wire. Inexpensive - coaxial cable is cheap, one network adapter per host. Switched networks needed to similar. Resulted in switched Ethernet. Most Ethernet links are now point-to-point between hubs, switches, and routers. Tuesday, September 13 CS 475 Networks - Lecture 6 13

Wireless Wireless networks share some common characteristics with wired networks Bit errors are of great concern Media is inherently multi-access Wireless networks differ from wired networks in several ways Low power, especially small mobile devices Limits on transmission power and frequency, uses spread spectrum to minimize interference from other devices Tuesday, September 13 CS 475 Networks - Lecture 6 14

Wireless Table 2.4 Overview of Leading Wireless Technologies Typical link length Typical data rate Typical use Wired analogy Bluetooth 802.15.1 WiFi 802.11 3G Cellular 10 m 100 m Tens of km 2.1 Mbps (shared) Peripherals to computer (PAN) 54 Mbps (shared) Laptop to wired network USB Ethernet DSL 384+ kbps (per conn.) Mobile device to wired tower Tuesday, September 13 CS 475 Networks - Lecture 6 15

Wireless Most common wireless links are asymmetric. One node (the base station) is not mobile and has a wired (or high BW) connection to another network. Fig 2.28 Wireless network with base station Even though radio waves transmitted by one client may be received by another, all node-tonode comm. is routed through the base station. Tuesday, September 13 CS 475 Networks - Lecture 6 16

Wireless The base station topology is associated with three levels of mobility: (1) no mobility (original WiMAX), (2) mobility within the range of a base (Bluetooth), and (3) mobility between bases (Wi-Fi, cell phones). An alternative topology is the mesh or ad hoc network in which there is no base station. All nodes are peers and communicate with neighbors. Messages may be forwarded along a chain of peer nodes. Tuesday, September 13 CS 475 Networks - Lecture 6 17

Wireless Fig 2.29 A wireless mesh or ad hoc network Tuesday, September 13 CS 475 Networks - Lecture 6 18

802.11 / Wi-Fi Physical Properties Wi-Fi runs over six different physical layer protocols. The original 802.11 defined spread spectrum and direct sequence channels at 2 Mbps. 802.11b defined a new channel operating at 11 Mbps. All operated at 2.4 GHz. 802.11a delivers up to 54 Mbps and operates at 5 GHz. 802.11g went back to 2.4 GHz and delivers up to 54 Mbps. Most commercial products support 802.11a, 802.11b, and 802.11g to ensure compatibility with all WiFi devices. Tuesday, September 13 CS 475 Networks - Lecture 6 19

802.11 / Wi-Fi - Collision Avoidance Due to hidden nodes collision avoidance is used instead of collision detection. The sender sends a Request to Send (RTS) packet waiting for a Clear to Send (CTS) from the receiver. Any adjacent nodes that see the CTS do not transmit. Fig. 2.30/2.31 Hidden and Exposed Nodes Tuesday, September 13 CS 475 Networks - Lecture 6 20

802.11 / Wi-Fi - Scanning To enable initial connection and mobility between access points (APs): 1) A node sends a Probe. 2) All APs within range send a Probe Response. 3) The node sends an Assoc. Request to one AP 4) The AP responds with an Assoc. Response frame Fig. 2.32/2.33 Node Mobility Tuesday, September 13 CS 475 Networks - Lecture 6 21

802.11 / Wi-Fi - Frame Format A WiFi frame can carry up to 2,312 data bytes. The Control field indicates if the frame is an RTS or CTS and also contains the ToDS and FromDS bits. If two nodes are directly comm. both DS bits are 0, Addr1 ids the destination and Addr2 the source. In the more complex case where two nodes use two different APs, both bits are 1 and the AP addresses are included in the frame. Tuesday, September 13 CS 475 Networks - Lecture 6 22

Bluetooth (802.15.1) Bluetooth operates in the license exempt band of 2.45 GHz. It offers speeds up to 2.1 Mbps and low power consumption. It has a short range of only 10 m. A Bluetooth piconet consists of a master device and up to seven active slave devices (up to 255 devices can be inactive or parked). All comm. is through the master. Bluetooth uses spread spectrum across 79 channels to prevent interference with other devices operating at 2.45 GHz. Tuesday, September 13 CS 475 Networks - Lecture 6 23

Bluetooth (802.15.1) Fig 2.35 A Bluetooth piconet Tuesday, September 13 CS 475 Networks - Lecture 6 24

Cell Phone Technologies The area served by a cell phone base station is known as a cell. Cells overlap, but at any time a phone is communication with only one base. As the phone moves a handoff may be used to transfer the phone to a new base. There are several competing cell phone technologies. 2G (and higher) technologies are digital and optimized for voice. 3G and 4G have higher BW and simultaneous voice and data transmission. There are several (incompatible) technologies. Tuesday, September 13 CS 475 Networks - Lecture 6 25

Summary Chapter 2 introduced the many and varied types of links, and looked at five key problems How to encode bits into a signal at a source node and recover the bits at the receiving node How to package bits into frames How to detect bit errors How to make a link appear reliable How to mediate access to a shared link so that all nodes eventually have a chance to transmit data Tuesday, September 13 CS 475 Networks - Lecture 6 26