DOC PREVIEW
CMU 15441 Computer Networking - Wireless Networking

This preview shows page 1-2-3-18-19-37-38-39 out of 39 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

15-441: Computer NetworkingWireless NetworkingOutline• Wireless Challenges• 802.11 Overview• Link Layer• Ad-hoc Networks15-44104-24-082Assumptions made in Internet• Host are (mostly) stationary• Address assignment, routing• Links in the network are fairly homogeneous• Transport protocols, applications• Hosts are fairly powerful• End to end principle: push functionality to end points• Security is an end host issue• No security inside the network (architecturally)15-44104-24-083Mobility• Many clients today are mobile• Mobility inside a subnet is supported• E.g. moving across APs that are part of a single EBSS• Mobility across subnets is harder because the IP address is used as address and identifier• Identifier: who you are• Address: where you can be found• Keep IP address: network gets confused• Delivers packets to wrong “old” subnet• New IP address: host gets confused• Transport protocols, applications, etc.15-44104-24-084Link Heterogeneity• Original links were basically telephone lines• Today: huge diversity• Optical fiber (wavelengths) … copper … wireless• Need to share airwaves rather than wire• Don’t know what hosts are involved• Host may not be using same link technology• Wireless is generally slow• Error characteristics: higher on wireless - attenuation, interference, multipath• Latency: absolute delay and variance in delay• Mobility adds to diversity• E.g. hand off can cause delays and sudden changes in available bandwidth15-44104-24-085Device Capabilities• Originally: mainframes and personal computers• Today: sensors … supercomputers• Note: almost any networked device today is more capable than early computers!• But our requirements and expectations have increased• Anything at or above “PC class” is very capable• Laptop: view as mobile PC• PDA: view as 5 year old PC (kind of)• Cell phone: not even close to a PC• Sensors: often run as private networks15-44104-24-086Security• Access to the network enables all kinds of attacks• Argues for pushing security inside the network• Firewalls are a very ad hoc way of doing this• Wireless creates unique challenges• Do not need physical connection to sniff or send• WEP, 802.1x, etc.• But wireless security needs to be linked into system wide security15-44104-24-087Overview• Wireless Challenges• 802.11 Overview• Link Layer Challenges• Ad-hoc Networks15-44104-24-088IEEE 802.11 Wireless LAN• 802.11b• 2.4-2.5 GHz unlicensed radio spectrum• up to 11 Mbps• direct sequence spread spectrum (DSSS) in physical layer• all hosts use same chipping code• widely deployed, using base stations• 802.11a• 5-6 GHz range• up to 54 Mbps• 802.11g• 2.4-2.5 GHz range• up to 54 Mbps• All use CSMA/CA for multiple access• All have base-station and ad-hoc network versions15-44104-24-089IEEE 802.11 Wireless LAN• IEEE 802.11a• PHY Standard : 8 channels : up to 54 Mbps : some deployment• IEEE 802.11b• PHY Standard : 3 channels : up to 11 Mbps : widely deployed.• IEEE 802.11d• MAC Standard : support for multiple regulatory domains (countries)• IEEE 802.11e• MAC Standard : QoS support : supported by many vendors• IEEE 802.11f• Inter-Access Point Protocol : deployed• IEEE 802.11g• PHY Standard: 3 channels : OFDM and PBCC : widely deployed (as b/g)• IEEE 802.11h• Suppl. MAC Standard: spectrum managed 802.11a (TPC, DFS): standard• IEEE 802.11i• Suppl. MAC Standard: Alternative WEP : standard• IEEE 802.11n• MAC Standard: MIMO : standardization expected late 200815-44104-24-0810IEEE 802.11 Wireless LAN• Wireless host communicates with a base station• Base station = access point (AP)• Basic Service Set (BSS) (a.k.a. “cell”) contains:• Wireless hosts• Access point (AP): base station• BSS’s combined to form distribution system (DS)15-44104-24-0811• Ad hoc network: IEEE 802.11 stations can dynamically form network without AP• Applications:• Vehicles exchange information (VANET)• Laptops meeting in conference room, car• Interconnection of “personal” devicesAd Hoc Networks15-44104-24-0812Overview• Wireless Challenges• 802.11 Overview• Link Layer Challenges• Ad-hoc Networks15-44104-24-0813CSMA/CD Does Not Work• Collision detection problems• Relevant contention at the receiver, not sender• Hidden terminal• Exposed terminal• Hard to build a radio that can transmit and receive at same timeABCABCDHidden Exposed15-44104-24-0814IEEE 802.11 MAC Protocol: CSMA/CA802.11 CSMA: sender- If sense channel idle for DISF(Distributed Inter Frame Space)then transmit entire frame(no collision detection)- If sense channel busythen binary backoff802.11 CSMA receiver:- If received OKreturn ACK after SIFS(Short IFS)(ACK is needed due tolack of collision detection)15-44104-24-0816IEEE 802.11 MAC Protocol802.11 CSMA Protocol: others• NAV: Network Allocation Vector• 802.11 frame has transmission time field• Others (hearing data) defer access for NAV time units15-44104-24-0817Collision Avoidance Mechanisms• Problem:• Two nodes, hidden from each other, transmit complete frames to base station• Wasted bandwidth for long duration !• Solution: • Small reservation packets• Nodes track reservation interval with internal “network allocation vector” (NAV)15-44104-24-0818Collision Avoidance: RTS-CTS Exchange• Explicit channel reservation• Sender: send short RTS: request to send• Receiver: reply with short CTS: clear to send• CTS reserves channel for sender, notifying (possibly hidden) stations• RTS and CTS short:• collisions less likely, of shorter duration• end result similar to collision detection• Avoid hidden station collisions• Not widely used/implemented• Consider typical traffic patterns15-44104-24-0819Overview• Wireless Challenges• 802.11 Overview• Link Layer Challenges• Ad-hoc Networks15-44104-24-0820Ad Hoc Networks• All the challenges of wireless, plus some of:• No fixed infrastructure• Mobility (on short time scales)• Chaotically decentralized (:-)• Multi-hop!• Nodes are both traffic sources/sinks and forwarders• The big challenge: Routing15-44104-24-0821Ad Hoc Routing• Find multi-hop paths through network• Adapt to new routes and movement / environment changes• Deal with interference and power issues• Scale well with # of nodes• Localize effects of link changes15-44104-24-0822Traditional Routing


View Full Document

CMU 15441 Computer Networking - Wireless Networking

Documents in this Course
Lecture

Lecture

14 pages

Lecture

Lecture

19 pages

Lecture

Lecture

14 pages

Lecture

Lecture

78 pages

Lecture

Lecture

35 pages

Lecture

Lecture

4 pages

Lecture

Lecture

4 pages

Lecture

Lecture

29 pages

Lecture

Lecture

52 pages

Lecture

Lecture

40 pages

Lecture

Lecture

44 pages

Lecture

Lecture

41 pages

Lecture

Lecture

38 pages

Lecture

Lecture

40 pages

Lecture

Lecture

13 pages

Lecture

Lecture

47 pages

Lecture

Lecture

49 pages

Lecture

Lecture

7 pages

Lecture

Lecture

18 pages

Lecture

Lecture

15 pages

Lecture

Lecture

74 pages

Lecture

Lecture

35 pages

Lecture

Lecture

17 pages

lecture

lecture

13 pages

Lecture

Lecture

21 pages

Lecture

Lecture

14 pages

Lecture

Lecture

53 pages

Lecture

Lecture

52 pages

Lecture

Lecture

40 pages

Lecture

Lecture

11 pages

Lecture

Lecture

20 pages

Lecture

Lecture

39 pages

Lecture

Lecture

10 pages

Lecture

Lecture

40 pages

Lecture

Lecture

25 pages

lecture

lecture

11 pages

lecture

lecture

7 pages

Lecture

Lecture

10 pages

lecture

lecture

46 pages

lecture

lecture

7 pages

Lecture

Lecture

8 pages

lecture

lecture

55 pages

lecture

lecture

45 pages

lecture

lecture

47 pages

lecture

lecture

39 pages

lecture

lecture

33 pages

lecture

lecture

38 pages

lecture

lecture

9 pages

midterm

midterm

16 pages

Lecture

Lecture

39 pages

Lecture

Lecture

14 pages

Lecture

Lecture

46 pages

Lecture

Lecture

8 pages

Lecture

Lecture

40 pages

Lecture

Lecture

11 pages

Lecture

Lecture

41 pages

Lecture

Lecture

38 pages

Lecture

Lecture

9 pages

Lab

Lab

3 pages

Lecture

Lecture

53 pages

Lecture

Lecture

51 pages

Lecture

Lecture

38 pages

Lecture

Lecture

42 pages

Lecture

Lecture

49 pages

Lecture

Lecture

63 pages

Lecture

Lecture

7 pages

Lecture

Lecture

51 pages

Lecture

Lecture

35 pages

Lecture

Lecture

29 pages

Lecture

Lecture

65 pages

Lecture

Lecture

47 pages

Lecture

Lecture

41 pages

Lecture

Lecture

41 pages

Lecture

Lecture

32 pages

Lecture

Lecture

35 pages

Lecture

Lecture

15 pages

Lecture

Lecture

52 pages

Lecture

Lecture

16 pages

Lecture

Lecture

4 pages

lecture

lecture

27 pages

lecture04

lecture04

46 pages

Lecture

Lecture

46 pages

Lecture

Lecture

13 pages

lecture

lecture

41 pages

lecture

lecture

38 pages

Lecture

Lecture

40 pages

Lecture

Lecture

25 pages

Lecture

Lecture

38 pages

lecture

lecture

11 pages

Lecture

Lecture

42 pages

Lecture

Lecture

12 pages

Lecture

Lecture

36 pages

Lecture

Lecture

46 pages

Lecture

Lecture

35 pages

Lecture

Lecture

34 pages

Lecture

Lecture

9 pages

lecture

lecture

49 pages

class03

class03

39 pages

Lecture

Lecture

8 pages

Lecture 8

Lecture 8

42 pages

Lecture

Lecture

20 pages

lecture

lecture

29 pages

Lecture

Lecture

9 pages

lecture

lecture

46 pages

Lecture

Lecture

12 pages

Lecture

Lecture

24 pages

Lecture

Lecture

41 pages

Lecture

Lecture

37 pages

lecture

lecture

59 pages

Lecture

Lecture

47 pages

Lecture

Lecture

34 pages

Lecture

Lecture

38 pages

Lecture

Lecture

28 pages

Exam

Exam

17 pages

Lecture

Lecture

21 pages

Lecture

Lecture

15 pages

Lecture

Lecture

9 pages

Project

Project

20 pages

Lecture

Lecture

40 pages

L13b_Exam

L13b_Exam

17 pages

Lecture

Lecture

48 pages

Lecture

Lecture

10 pages

Lecture

Lecture

52 pages

21-p2p

21-p2p

16 pages

lecture

lecture

77 pages

Lecture

Lecture

18 pages

Lecture

Lecture

62 pages

Lecture

Lecture

25 pages

Lecture

Lecture

24 pages

Project

Project

20 pages

Lecture

Lecture

47 pages

Lecture

Lecture

38 pages

Lecture

Lecture

35 pages

Roundup

Roundup

45 pages

Lecture

Lecture

47 pages

Lecture

Lecture

39 pages

Lecture

Lecture

13 pages

Midterm

Midterm

22 pages

Project

Project

26 pages

Lecture

Lecture

11 pages

Project

Project

27 pages

Lecture

Lecture

10 pages

Lecture

Lecture

50 pages

Lab

Lab

9 pages

Lecture

Lecture

30 pages

Lecture

Lecture

6 pages

r05-ruby

r05-ruby

27 pages

Lecture

Lecture

8 pages

Lecture

Lecture

28 pages

Lecture

Lecture

30 pages

Project

Project

13 pages

Lecture

Lecture

11 pages

Lecture

Lecture

12 pages

Lecture

Lecture

48 pages

Lecture

Lecture

55 pages

Lecture

Lecture

36 pages

Lecture

Lecture

17 pages

Load more
Download Wireless Networking
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Wireless Networking and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Wireless Networking 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?