sjtu 2018 fall computer networking
play

SJTU 2018 Fall Computer Networking 1 Wi Wireless Communication - PowerPoint PPT Presentation

SJTU 2018 Fall Computer Networking 1 Wi Wireless Communication Internet Protocol Stack 2 Application : supporting network applications Application - FTP, SMTP, HTTP Transport Transport : data transfer between processes Network -


  1. SJTU 2018 Fall Computer Networking 1 Wi Wireless Communication

  2. Internet Protocol Stack 2 • Application : supporting network applications Application - FTP, SMTP, HTTP Transport • Transport : data transfer between processes Network - TCP, UDP • Network : routing of datagrams from Link source to destination - IP, routing protocols Physical • Link : data transfer between neighboring network elements - Ethernet, WiFi • Physical : bits “on the wire” - Coaxial cable, optical fibers, radios

  3. Introduction to Link Layer and IEEE 802.11 (WiFi) 3

  4. Outline 4 • Introduction to Link Layer • Introduction to IEEE 802.11 • 802.11 Physical Layer • 802.11 MAC Layer • 802.11 Management

  5. Link Layer Services 5 • Framing, link access: - implement channel access if shared medium (e.g., Ethernet) - encapsulate datagram into frame, adding header, trailer - ‘physical addresses’ used in frame headers to identify source, destination > different from IP address! • Reliable delivery between two devices - error detection / correction • Flow control

  6. Link Layer: Setting the Context 6

  7. MAC: Multiple Access Protocols 7 • Determine how stations share channel - single shared communication channel - two or more simultaneous transmissions by nodes: interference > only one node can send successfully at a time • What to look for in MAC protocols - Synchronous vs. asynchronous - Centralized vs. decentralized - Performance: efficiency and fairness

  8. MAC Protocols: a Taxonomy 8 • Channel Partitioning - Divide channel into smaller “pieces” (time slots, frequency, code) - Allocate piece to node for exclusive use - Example: > TDMA: partition time slots > FDMA: partition frequency > CDMA: partition code • Random Access - Allow collisions - “recover” from collisions

  9. Random Access Protocols 9 • When a node has a packet to send - transmit at full channel data rate R - no a priori coordination among nodes • Two or more transmitting nodes - collision • Random access MAC protocol specifies: - how to detect collisions - how to recover from collisions (e.g., via delayed retransmissions)

  10. Random Access Protocols 10 • Examples of random access MAC protocols - Pure ALOHA - Slotted ALOHA - CSMA and CSMA/CD

  11. Pure ALOHA 11 • Transmit whenever a message is ready • Retransmit when there is a collision

  12. Slotted Aloha 12 • Time is divided into equal size slots (= pkt trans. time) • Node with new pkt: transmit at beginning of next slot • If collision: retransmit pkt in future slots

  13. Slotted Aloha Efficiency 13 • Q: What is max efficiency? - Suppose N stations have packets to send each with a probability P - Succeed by a given node: P ( 1-P ) ( N-1 ) - Succeed by any of N nodes: S = NP ( 1-P ) ( N-1 ) - S is optimalized as 1/e = 0.37 as N goes to infinity

  14. Pure ALOHA v.s. Slotted ALOHA 14 • What’s the max efficiency of pure aloha? S

  15. Problems with Pure/Slotted ALOHA 15 • Pure ALOHA - Transmit whenever a message is ready - Retransmit when there is a collision • Slotted ALOHA - Time is divided into equal time slots - Transmit only at the beginning of a time slot - Avoid partial collisions - Increase delay, and require synchronization Problem: do not listen to the channel

  16. CSMA: Carrier Sense Multiple Access 16 • Listen before transmit - If channel sensed idle: transmit entire pkt - If channel sensed busy, defer transmission • Persistent CSMA - retry immediately with probability p • Non-persistent CSMA - retry after random interval

  17. Does carrier sense eliminate collisions? 17

  18. CSMA collisions 18

  19. CSMA collisions 19 • Propagation delay: two nodes may not hear each other’s transmission • Collision: entire packet transmission time wasted

  20. CSMA/CD (Collision Detection) 20 • CSMA/CD: carrier sensing, deferral as in CSMA - collisions detected within short time - colliding transmissions aborted, reducing channel wastage

  21. CSMA/CD (Collision Detection) 21 without Collision Detection with Collision Detection

  22. CSMA/CD (Collision Detection) 22 • Collision detection - easy in wired LANs: measure signal strengths, compare transmitted, received signals - can we do collision detection in wireless networks? No.. difficult in wireless LANs • Most receivers cannot send and receive at the same time • receiver’s channel condition is different from that of the sender

  23. Outline 23 • Introduction to Link Layer • Introduction to IEEE 802.11 • 802.11 Physical Layer • 802.11 MAC Layer • 802.11 Management

  24. Infrastructure v.s. Ad-Hoc Networks 24

  25. 802.11: Infrastructure Mode 25 Station (STA) • laptop, phone, etc. Access Point (AP) • station integrated into the wireless LAN and the distribution system • Basic Service Set (BSS) group of stations using the same AP • Portal bridge to other (wired) networks • Distribution System interconnection network to form one logical network (EES: Extended Service Set) based on several BSS

  26. 802.11: Ad-Hoc Mode 26 Direct communication within a limited • range • Station (STA) laptop, phone, etc. • Independent Basic Service Set (IBSS) group of stations using the same network

  27. IEEE standard 802.11 27

  28. 802.11 Layers and Functions 28 • MAC • PMD: access mechanisms, fragmentation, error Physical Medium Dependent control, encryption modulation, coding • MAC Management • PHY Management synchronization, roaming, MIB, power channel selection, MIB management • Station Management • PLCP: coordination of all management Physical Layer Convergence Protocol functions clear channel assessment signal (carrier sense)

  29. Outline 29 • Introduction to Link Layer • Introduction to IEEE 802.11 • 802.11 Physical Layer • 802.11 MAC Layer • 802.11 Management

  30. WLAN: IEEE 802.11b 30 • Data Rate • Quality of Service - 1, 2, 5.5, 11Mbit/s - Best effort, no guarantees - User data rate max. approx. 6 (unless polling is used, Mbit/s limited support in products) • Transmission range • Manageability - 300m outdoor - Limited (no automated key 30m indoor distribution, sym. Encryption) - Max. data rate ~10m indoor • Pros • Frequency - Available worldwide - Free 2.4 GHz ISM-band - Free ISM-band • Security • Cons - Limited, WEP insecure, SSID - Heavy interference on ISM-band • Connection set-up time - No service guarantees - Relatively low data rate - Connectionless / always on

  31. WLAN: IEEE 802.11a 31 • Data Rate • Quality of Service - 6,9,12,18,24,36,48,54 Mbit/s - Best effort, no guarantees - User throughput (1500 byte (same as all 802.11 products) packets): 5.3 (6), 18 (24), 24 (36), • Manageability 32 (54) - Limited (no automated key • Transmission range distribution, sym. Encryption) • Pros - 100m outdoor 10m indoor - Fits into 802.x standards • Frequency - Free ISM-band - Free 5.15-5.25, 5.25-5.35, 5.725- - Available, simple system 5.825 GHz ISM-band - Uses less crowded 5 GHz band • Security - Higher data rates • Cons - Limited, WEP insecure, SSID • Connection set-up time - Shorter range - Connectionless / always on

  32. WLAN: IEEE 802.11n 32 • Data Rate • Quality of Service - 7.2, 14.4, 21.7, 28.9, ...,72.2 Mbit/s - Best effort, no guarantees (same as all 802.11 products) • Multiple input multiple output • Manageability (MIMO) - Limited (no automated key • 20MHz and 40MHz bands distribution, sym. Encryption) • Transmission range • Pros - Increase range by several factors - Fits into 802.x standards due to MIMO - Free ISM-band • Frequency - Available, simple system – Free 2.4GHz, 5.15-5.25, 5.25- - Uses dual band 5.35, 5.725-5.825 GHz ISM-band - Higher data rates • Security • Cons - Limited, WEP insecure, SSID - Interference on ISM-band • Connection set-up time - Connectionless / always on

  33. WLAN: IEEE 802.11ac 33 • Data Rate • Quality of Service - 6.5 Bps ~ 3.466 Gps - Best effort, no guarantees (same as all 802.11 products) • MIMO • Manageability • 20, 40, 60, 80MHz bands - Limited (no automated key • Transmission range distribution, sym. Encryption) - Increase range by several factors • Pros due to MIMO - Fits into 802.x standards • Frequency - Free ISM-band – Free 2.4GHz, 5.15-5.25, 5.25- - Available, simple system 5.35, 5.725-5.825 GHz ISM-band - Uses dual band • Security - Higher data rates - Limited, WEP insecure, SSID • Cons • Connection set-up time - Interference on ISM-band - Connectionless / always on

  34. Outline 34 • Introduction to Link Layer • Introduction to IEEE 802.11 • 802.11 Physical Layer • 802.11 MAC Layer • 802.11 Management

  35. 802.11 MAC Layer DFWMAC 35 • DFWMAC: Distributed Foundation Wireless MAC • Distributed and centralized access methods - DFWMAC-DCF CSMA/CA (mandatory) > Distributed Coordination Function > collision avoidance via randomized “back-off“ mechanism > ACK packet for acknowledgements (not for broadcasts) - DFWMAC-DCF w/ RTS/CTS (optional) > avoids hidden terminal problem - DFWMAC-PCF (optional) > Point Coordination Function > access point polls terminals according to a list

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend