Types of Wireless Systems
Types of Wireless Systems
                                                           2
Wireless Networks
Wireless networks
 Access computing/communication services, on the move
 Wireless WANs
   – Cellular Networks: GSM, GPRS, CDMA
   – Satellite Networks: Iridium
 Wireless LANs
   – WiFi Networks: 802.11
   – Personal Area Networks: Bluetooth
 Wireless MANs
   – WiMaX Networks: 802.16
   – Mesh Networks: Multi-hop WiFi
   – Adhoc Networks: useful when infrastructure not available
                                                                4
Limitations of the mobile environment
 Limitations of the Wireless Network
    limited communication bandwidth
    frequent disconnections
    heterogeneity of fragmented networks
                      stationary computer
                      laptop in a hotel (portable)
                      wireless LAN in historic buildings
                      Personal Digital Assistant (PDA)
                                                             6
Wireless v/s Wired networks
  Regulations of frequencies
    – Limited availability, coordination is required
    – useful frequencies are almost all occupied
  Bandwidth and delays
    – Low transmission rates
       • few Kbits/s to some Mbit/s.
    – Higher delays
       • several hundred milliseconds
    – Higher loss rates
       • susceptible to interference, e.g., engines, lightning
  Always shared medium
    – Lower security, simpler active attacking
    – radio interface accessible for everyone
    – secure access mechanisms important                         7
Wireless Technology Landscape
 72 Mbps
  72 Mbps    Turbo .11a
 54 Mbps       802.11{a,b}
  54 Mbps
 5-11 Mbps         802.11b                              .11 p-to-p link
  5-11 Mbps
 1-2 Mbps            802.11                                               µwave p-to-p links
  1-2 Mbps Bluetooth
                                                                                 3G
 384 Kbps                          WCDMA, CDMA2000
  384 Kbps
                                                                                 2G
 56 Kbps                             IS-95, GSM, CDMA
  56 Kbps
                                                                                                8
Reference model
Application Application
Transport Transport
Radio Medium
                                                                      9
Effect of mobility on protocol stack
  Application
    – new applications and adaptations
    – service location, multimedia
  Transport
    – congestion and flow control
    – quality of service
  Network
    – addressing and routing
    – device location, hand-over
  Link
    – media access and security
  Physical
    – transmission errors and interference
                                             10
Perspectives
 Network designers: Concerned with cost-effective
  design
   – Need to ensure that network resources are efficiently utilized
     and fairly allocated to different users.
                                                     13
  Frequencies for communication
twisted                  coax cable                                             optical transmission
pair
 1 Mm           10 km          100 m         1m        10 mm       100 m          1 m
300 Hz          30 kHz         3 MHz       300 MHz     30 GHz       3 THz         300 THz
                                                                       16
 Frequency regulations
 Frequencies from 9KHz to 300 MHZ in high demand
  (especially VHF: 30-300MHZ)
 Two unlicensed bands
   – Industrial, Science, and Medicine (ISM): 2.4 GHz
   – Unlicensed National Information Infrastructure (UNII): 5.2 GHz
 Different agencies license and regulate
   –   www.fcc.gov - US
   –   www.etsi.org - Europe
   –   www.wpc.dot.gov.in - India
   –   www.itu.org - International co-ordination
 Regional, national, and international issues
 Procedures for military, emergency, air traffic control, etc
                                                                      17
Wireless transmission
 Antenna                                          Antenna
     Transmitter                            Receiver
Suppose you want to generate a signal that is sent at 900 MHz and
the original source generates a signal at 300 MHz.
    •Amplifier - strengthens the initial signal
    •Oscillator - creates a carrier wave of 600 MHz
    •Mixer - combines signal with oscillator and produces 900 MHz
    (also does modulation, etc)
    •Filter - selects correct frequency
    •Amplifier - Strengthens the signal before sending it
                                                              19
Antennas
Antennas
 An antenna is an electrical conductor or system of
  conductors to send/receive RF signals
   – Transmission - radiates electromagnetic energy into space
   – Reception - collects electromagnetic energy from space
 In two-way communication, the same antenna can be
  used for transmission and reception
                                                                 21
Antennas: isotropic radiator
 Radiation and reception of electromagnetic waves,
  coupling of wires to space for radio transmission
 Isotropic radiator: equal radiation in all directions
  (three dimensional) - only a theoretical reference
  antenna
 Real antennas always have directive effects
  (vertically and/or horizontally)
 Radiation pattern: measurement of radiation around
  an antenna
                                  z
            y     z
                            y          x        ideal
                      x                         isotropic
                                                radiator
                                                            22
Antennas: simple dipoles
 Real antennas are not isotropic radiators
   – dipoles with lengths /4 on car roofs or /2 (Hertzian dipole)
      shape of antenna proportional to wavelength
 Gain: maximum power in the direction of the main lobe
  compared to the power of an isotropic radiator (with the
  same average power)
/4 /2
y y z
                                                                                     simple
                          x                            z                         x   dipole
   side view (xy-plane)         side view (yz-plane)       top view (xz-plane)
                                                                                              23
Antennas: directed and sectorized
 Often used for microwave connections or base stations
  for mobile phones (e.g., radio coverage of a valley)
       y                              y                              z
                                                                                         directed
                        x                              z                             x   antenna
                                                           z
              z
                                                                     x
                                                                                         sectorized
                            x                                                            antenna
                                                                                                    24
Antenna models
In Omni Mode:
 Nodes receive signals with gain Go
In Directional Mode:
 Capable of beamforming in specified direction
 Directional Gain Gd (Gd > Go)
                                                  25
Directional communication
                                          27
Antennas: diversity
 Grouping of 2 or more antennas
  – multi-element antenna arrays
 Antenna diversity
  – switched diversity, selection diversity
     • receiver chooses antenna with largest output
  – diversity combining
     • combine output power to produce gain
     • cophasing needed to avoid cancellation
                                                        /2       /2
                                /4   /2   /4   /2
+ +
                      ground plane
                                                                        28
Signal Propagation and Modulation
Signals
 physical representation of data
 function of time and location
 signal parameters: parameters representing the value of
  data
 classification
   –   continuous time/discrete time
   –   continuous values/discrete values
   –   analog signal = continuous time and continuous values
   –   digital signal = discrete time and discrete values
 signal parameters of periodic signals:
  period T, frequency f=1/T, amplitude A, phase shift 
   – sine wave as special periodic signal for a carrier:
                                                               30
Signal propagation ranges
 Transmission range
   – communication possible
   – low error rate
                                 sender
 Detection range
   – detection of the signal   transmission
     possible
                                              distance
   – no communication           detection
     possible
 Interference range           interference
                                   32
Attenuation
                                                                      multipath
                                                           LOS pulses pulses
     signal at sender
 Time   dispersion: signal is dispersed over time          signal at receiver
           interference with “neighbor” symbols, Inter Symbol
  Interference (ISI)
 The signal reaches a receiver directly and phase shifted
           distorted signal depending on the phases of the different parts
                                                                            35
Effects of mobility
 Channel characteristics change over time and location
   – signal paths change
   – different delay variations of different signal parts
   – different phases of signal parts
  quick changes in the power received
                                        power                 long term
(short term fading)                                           fading
 Additional changes in
   – distance to sender
   – obstacles further away                                       t
                                          short term fading
  slow changes in the average power
  received (long term fading)
                                                                      36
Propagation modes                             Signal
                               Transmission                Receiving
                               Antenna                     Antenna
                                               Earth
 a) Ground Wave Propagation
                                              Ionosphere
                                              Signal
b) Sky Wave Propagation
                                               Earth
                                                  Signal
c) Line-of-Sight Propagation
                                                 Earth
                                                                       37
Modulation
 Digital modulation
   – digital data is translated into an analog signal (baseband)
   – ASK, FSK, PSK
   – differences in spectral efficiency, power efficiency, robustness
 Analog modulation
   – shifts center frequency of baseband signal up to the radio
     carrier
 Motivation
   – smaller antennas (e.g., /4)
   – Frequency Division Multiplexing
   – medium characteristics
 Basic schemes
   – Amplitude Modulation (AM)
   – Frequency Modulation (FM)
   – Phase Modulation (PM)
                                                                   38
Modulation and demodulation
                               analog
                               baseband
 digital
                               signal
 data            digital                     analog
101101001      modulation                   modulation                 radio transmitter
                                         radio
                                         carrier
                             analog
                             baseband
                                                             digital
                             signal
              analog                    synchronization      data
            demodulation                   decision       101101001    radio receiver
                   radio
                   carrier
                                                                                    39
Digital modulation
 Modulation of digital signals known as Shift Keying
 Amplitude Shift Keying (ASK):                1      0   1
   – very simple
   – low bandwidth requirements
   – very susceptible to interference                         t
                                                              t
 Phase Shift Keying (PSK):
   – more complex
                                              1       0   1
   – robust against interference
 Many advanced variants
                                                              t
                                                                  40
Multiplexing Mechanisms
Multiplexing
                                 channels ki
k1 k2 k3 k4 k5 k6
                                        c
 Multiplexing in 4 dimensions
                                                 t                       c
   – space (si)
                                                                                       t
   – time (t)                      s1
                                                           f
   – frequency (f)                                                  s2
   – code (c)                                                                              f
                                                      c
                                                                     t
 Goal: multiple use
  of a shared medium                             s3
                                                                                  f
                                                                                      42
Frequency multiplex
  Separation of the whole spectrum into smaller frequency
   bands
  A channel gets a certain band of the spectrum for the whole
   time
  Advantages:
                                     k1   k2  k3    k4  k5   k6
  no dynamic coordination
   necessary                      c
  Disadvantages:
  waste of bandwidth
   if the traffic is
   distributed unevenly
  inflexible        t
  guard spaces
                                                            43
Time multiplex
 A channel gets the whole spectrum for a certain
  amount of time
 Advantages:
 only one carrier in the
  medium at any time               k1   k2   k3   k4   k5   k6
 Disadvantages:
 precise
  synchronization
  necessary t
                                                            44
Time and frequency multiplex
                                                                    46
CDMA Example
   – D = rate of data signal
   – Break each bit into k chips
      • Chips are a user-specific fixed pattern
   – Chip data rate of new channel = kD
                                                      48
Spread spectrum technology
 Problem of radio transmission: frequency dependent
  fading can wipe out narrow band signals for duration of
  the interference
 Solution: spread the narrow band signal into a broad
  band signal using a special code - protection against
  narrow band interference
f f
 Side effects:
    – coexistence of several signals without dynamic coordination
    – tap-proof
 Alternatives: Direct Sequence, Frequency Hopping
                                                                     49
Spread-spectrum communications
                                        50
                                 Source: Intersil
 Effects of spreading and interference
       dP/df                  dP/df
                                               user signal
 i)                    ii)                     broadband interference
                                               narrowband interference
               f                      f
                sender
       dP/df                  dP/df              dP/df
iii)                  iv)                 v)
               f                      f                     f
                   receiver
                                                                  51
DSSS properties
                       52
                  Source: Intersil
DSSS (Direct Sequence)
 XOR of the signal with pseudo-random number
  (chipping sequence)
   – many chips per bit (e.g., 128) result in higher bandwidth of the
     signal                                  tb
 Advantages                                                  user data
   – reduces frequency selective
                                            0           1       XOR
     fading
                                                tc
   – in cellular networks
                                                              chipping
       • base stations can use the                            sequence
         same frequency range            01101010110101          =
       • several base stations can                            resulting
         detect and recover the signal                        signal
       • soft handover                   01101011001010
 Disadvantages                             tb: bit period
   – precise power control necessary        tc: chip period
                                                                     53
DSSS Transmit/Receive
                                spread
                                spectrum                   transmit
         user data              signal                     signal
                         X                  modulator
                chipping              radio
                sequence              carrier
transmitter
                                                  correlator
                                 lowpass                             sampled
    received                     filtered       products             sums
    signal                       signal                                              data
                  demodulator               X           integrator        decision
               radio            chipping
               carrier          sequence
receiver
                                                                                            54
Frequency Hopping Spread
Spectrum (FHSS)
 Signal is broadcast over seemingly random series of radio
  frequencies
 Signal hops from frequency to frequency at fixed intervals
 Channel sequence dictated by spreading code
 Receiver, hopping between frequencies in synchronization
  with transmitter, picks up message
 Advantages
   – Eavesdroppers hear only unintelligible blips
   – Attempts to jam signal on one frequency succeed only at knocking
     out a few bits
                                                               55
FHSS (Frequency Hopping)
  Discrete changes of carrier frequency
    – sequence of frequency changes determined via pseudo random
      number sequence
  Two versions
    – Fast Hopping: several frequencies per user bit
    – Slow Hopping: several user bits per frequency
  Advantages
    – frequency selective fading and interference limited to short
      period
    – simple implementation
    – uses only small portion of spectrum at any time
  Disadvantages
    – not as robust as DSSS
    – simpler to detect
                                                                     56
Slow and Fast FHSS
              tb
user data
     0        1                 0        1           1   t
f
              td
f3                                                           slow
f2                                                           hopping
                                                             (3 bits/hop)
f1
         td                                              t
f
f3                                                           fast
f2                                                           hopping
                                                             (3 hops/bit)
f1
                                                                            57
FHSS Transmit/Receive
                             narrowband               spread
                             signal                   transmit
     user data                                        signal
                 modulator               modulator
                                         frequency         hopping
                                        synthesizer        sequenc
                 transmitter                               e
                                   narrowband
          received                 signal
          signal                                          data
                     demodulator           demodulator
    hopping           frequency
    sequenc          synthesizer
    e                                                            receiver
                                                                            58
 OFDM (Orthogonal Frequency Division)
    Parallel data transmission on several
     orthogonal subcarriers with lower rate
                             c
                                                                  f
                 k3
                                                                             59
OFDM
 Properties
   – Lower data rate on each subcarrier  less ISI
   – interference on one frequency results in interference of one
     subcarrier only
   – no guard space necessary
   – orthogonality allows for signal separation via inverse FFT on
     receiver side
   – precise synchronization necessary (sender/receiver)
 Advantages
   – no equalizer necessary
   – no expensive filters with sharp edges necessary
   – better spectral efficiency (compared to CDM)
 Application
   – 802.11a, HiperLAN2, ADSL
                                                                     60
ALOHA
                                                         61
Aloha/slotted Aloha
  Mechanism
    – random, distributed (no central arbiter), time-multiplex
    – Slotted Aloha additionally uses time-slots, sending must
      always start at slot boundaries
                                 collision
  Aloha
  sender A
  sender B
  sender C
                                                          t
  sender A
  sender B
  sender C
                                                          t
                                                                 62
Slotted Aloha
 Time is divided into slots
   – slot = one packet transmission time at least
 Master station generates synchronization
  pulses for time-slots
 Station waits till beginning of slot to transmit
                                                     63
Error control
Bit level error detection/correction
Single-bit, multi-bit or burst errors introduced
  due to channel noise
   – Detected using redundant information sent along
     with data
 Full Redundancy:
   – Send everything twice
   – Simple but inefficient
 Common Schemes:
   – Parity
   – Cyclic Redundancy Check (CRC)
   – Checksum
                                                       65
Error detection process
 Transmitter
  – For a given frame, an error-detecting code (check bits)
    is calculated from data bits
  – Check bits are appended to data bits
 Receiver
  – Separates incoming frame into data bits and check
    bits
  – Calculates check bits from received data bits
  – Compares calculated check bits against received
    check bits
  – Detected error occurs if mismatch
                                                        66
Frame level error correction
 Problems in transmitting a sequence of frames
  over a lossy link
  – frame damage, loss, reordering, duplication, insertion
 Solutions:
  – Forward Error Correction (FEC)
     • Use of redundancy for packet level error correction
     • Block Codes, Turbo Codes
  – Automatic Repeat Request (ARQ)
     • Use of acknowledgements and retransmission
     • Stop and Wait; Sliding Window
                                                             67
Block Code (Error Correction)
 Hamming distance – for 2 n-bit binary sequences, the number of
   different bits
    – E.g., v1=011011; v2=110001; d(v1, v2)=3
 For each data block, create a codeword
 Send the codeword
 If the code is invalid, look for data with shortest hamming distance
   (possibly correct code)
  Datablock (k=2)            Codeword (n=5)
            00                                 00000
            01                                 00111
            10                                 11001
            11                                 11110
Suppose you receive codeword 00100 (error)
Closest is 00000 (only one bit different)
                                                                71
Bandwidth v/s bit width
                          72
Latency (delay)
 Time it takes to send message from point A to point B
   – Latency = Propagation + Transmit
                                    + Queue
   – Propagation = Distance /
                             SpeedOfLight
   – Transmit = Size / Bandwidth
                                                          73
Delay X Bandwidth product
                                               74
Delay X Bandwidth product
                                                75
TCP/IP Basics
Interconnection devices
Basic Idea: Transfer data from input to output
 Repeater
   – Amplifies the signal received on input and transmits it on
     output
 Switch
   – Reads destination address of each packet and forwards
     appropriately to specific port
   – Layer 3 switches (IP switches) also perform routing functions
 Router
   – decides routes for packets, based on destination address and
     network topology
   – Exchanges information with other routers to learn network
     topology
                                                                     77
Switched networks
                    78
TCP/IP layers
 Physical Layer:
  – Transmitting bits over a channel.
  – Deals with electrical and procedural interface to the
    transmission medium.
                                                        79
TCP/IP layers (contd.)
 Network Layer:
  – Addressing and routing of packets.
  – Deals with subnetting, route determination.
 Transport Layer:
  – end-to-end connection characteristics.
  – Deals with retransmissions, sequencing and
    congestion control.
                                                  80
TCP/IP layers (contd.)
  Application Layer:
    – ``application'' protocols.
    – Deals with providing services to users and
      application developers.
                                                    81
Lower layer services
 Unacknowledged connectionless service
   – No acknowledgements, no connection
   – Error recovery up to higher layers
   – For low error-rate links or voice traffic
                                                            82
 Generic router architecture
Data Hdr   Header Processing     1                   1    Queue
             Lookup     Update
           IP Address   Header                            Packet
            Address                                        Buffer
             Address                                        Buffer
             Table                                        Memory
              Table                                        Memory
            Address                                        Buffer
             Address                                        Buffer
             Table                                        Memory
              Table                                        Memory
           Header Processing
Data Hdr                         N                   N    Queue
             Lookup     Update
           IP Address   Header                            Packet
            Address                                        Buffer
             Address                                        Buffer
             Table                                        Memory
              Table                                        Memory
                                                                         83
Typical TCP behaviour
                          14
                                                   Congestion
                          12
 Congestion Window size
                                                   avoidance
                          10
       (segments)
                          8                                  Slow start
                          6                                  threshold
                               Slow start
                          4
                          2
                          0
                               0   1   2       3    4    5       6   7    8
                                            Time (round trips)
                                                                              84
 Slow start phase
                         Host A            Host B
• initialize:                     one segm
                                          ent
                         RTT
   • Cwnd = 1
                                  two segm
• for (each ACK)                          ents
   • Cwnd++
• until                           four segm
                                           ents
   • loss detection OR
   •Cwnd > ssthresh
                                             time
                                                 85
Congestion avoidance phase
                             Host A            Host B
/* Cwnd > threshold */                four segm
                                               ents
• Until (loss detection) {
                             RTT
  every w ACKs:
    Cwnd++                            five segm
                                               ents
  }
• ssthresh = Cwnd/2
• Cwnd = 1
• perform slow start
                  1
                                                time
                                                  86
TCP: Fast retransmit and Fast recovery
                            10
                                                      advertised window
                            8
   Window size (segments)
                            6
                            4                          After fast recovery
                            2
                            0
                                                89
 Infrastructure vs. Ad hoc networks
infrastructure
 network
                                  AP: Access Point
                    AP
             AP   wired network
                                      AP
ad-hoc network
                                                         90
                                                     Source: Schiller
 Difference between wired and wireless
                                                     92
Collision detection (CSMA/CD)
 All aforementioned scheme can suffer from collision
 Device can detect collision
  – Listen while transmitting
  – Wait for 2 * propagation delay
 On collision detection wait for random time before
  retrying
 Binary Exponential Backoff Algorithm
  – Reduces the chances of two waiting stations picking the
    same random time
                                                        93
Binary Exponential Backoff
1.On detecting 1st collision for packet x
   station A chooses a number r between 0 and 1.
       wait for r * slot time and transmit.
Slot time is taken as 2 * propagation delay
k. On detecting kth collision for packet x
   choose r between 0,1,..,(2k –1)
                                                         94
Hidden Terminal Problem
                A        B       C
   – A and C cannot hear each other.
   – A sends to B, C cannot receive A.
   – C wants to send to B, C senses a “free” medium
     (CS fails)
   – Collision occurs at B.
   – A cannot receive the collision (CD fails).
   – A is “hidden” for C.
                                                      95
Effect of interference range
          RTS               RTS
   D                A                   B                C
                             CTS              CTS
                            DATA
                                                             97
 Components of IEEE 802.11
 architecture
  The basic service set (BSS) is the basic building
   block of an IEEE 802.11 LAN
  The ovals can be thought of as the coverage area
   within which member stations can directly
   communicate
  The Independent BSS (IBSS) is the simplest LAN. It
   may consist of as few as two stations
ad-hoc network       BSS1        BSS2
                                                        98
 802.11 - ad-hoc network (DCF)
        802.11 LAN
                                                                        99
                                                                   Source: Schiller
 802.11 - infrastructure network (PCF)
                                                 Station (STA)
        802.11 LAN                                – terminal with access
                                     802.x LAN
                                                    mechanisms to the wireless
                                                    medium and radio contact to the
                                                    access point
STA1
       BSS1                                      Basic Service Set (BSS)
               Access                Portal       – group of stations using the same
                Point                               radio frequency
                                                 Access Point
                  Distribution System
                                                  – station integrated into the
                         Access                     wireless LAN and the distribution
ESS                       Point                     system
                                                 Portal
               BSS2
                                                  – bridge to other (wired) networks
                                                 Distribution System
                                                  – interconnection network to form
                                                    one logical network (EES:
        STA2            802.11 LAN      STA3        Extended Service Set) based
                                                    on several BSS
                                                                                 100
                                                                             Source: Schiller
802.11- in the TCP/IP stack
                                                              fixed terminal
  mobile terminal
server
infrastructure network
access point
  application                                           application
     TCP                                                   TCP
       IP                                                   IP
      LLC                    LLC                           LLC
  802.11 MAC        802.11 MAC   802.3 MAC             802.3 MAC
  802.11 PHY        802.11 PHY   802.3 PHY             802.3 PHY
                                                                      101
802.11 - MAC layer
  Traffic services
    – Asynchronous Data Service (mandatory) – DCF
    – Time-Bounded Service (optional) - PCF
  Access methods
    – DCF CSMA/CA (mandatory)
       • collision avoidance via randomized back-off mechanism
       • ACK packet for acknowledgements (not for broadcasts)
    – DCF w/ RTS/CTS (optional)
       • avoids hidden terminal problem
    – PCF (optional)
       • access point polls terminals according to a list
                                                             102
802.11 - CSMA/CA
                                                    contention window
    DIFS                         DIFS               (randomized back-off
                                                    mechanism)
                 direct access if                                    t
                 medium is free  DIFS        slot time
                                                                    103
     802.11 –CSMA/CA example
             DIFS          DIFS                DIFS                   DIFS
                                  boe   bor             boe bor              boe   busy
station1
                                  boe   busy
station2
                    busy
station3
busy medium not idle (frame, ack etc.) boe elapsed backoff time
                                                                                              104
      802.11 –RTS/CTS
 station can send RTS with reservation parameter after waiting for DIFS
  (reservation determines amount of time the data packet needs the
  medium)
 acknowledgement via CTS after SIFS by receiver (if ready to receive)
 sender can now send data at once, acknowledgement via ACK
 other stations store medium reservations distributed via RTS and CTS
           DIFS
                  RTS                     data
sender
                        SIFS                     SIFS
                               CTS SIFS                 ACK
receiver
                                                                                105
802.11 - PCF I
                t0 t1
                                         SuperFrame
                                                                         106
802.11 - PCF II
t2 t3 t4
                     PIFS                      SIFS
                D3          D4                        CFend
  point
  coordinator                    SIFS
                                          U4
  wireless
  stations
  stations‘                         NAV
  NAV                 contention free period                       contention        t
                                                                   period
                                                                                         107
CFP structure and Timing
                           108
802.11 - MAC management
 Synchronization
   – try to find a LAN, try to stay within a LAN
   – timer etc.
 Power management
   – sleep-mode without missing a message
   – periodic sleep, frame buffering, traffic measurements
 Association/Reassociation
   – integration into a LAN
   – roaming, i.e. change networks by changing access points
   – scanning, i.e. active search for a network
 MIB - Management Information Base
   – managing, read, write
                                                               109
 802.11 - Channels, association
 802.11b: 2.4GHz-2.485GHz spectrum divided into 11
  channels at different frequencies
   – AP admin chooses frequency for AP
   – interference possible: channel can be same as that
     chosen by neighboring AP!
 host: must associate with an AP
   – scans channels, listening for beacon frames containing
     AP’s name (SSID) and MAC address
   – selects AP to associate with
   – may perform authentication
   – will typically run DHCP to get IP address in AP’s subnet
                                                          110
    802.11 variants
    802.11i                              LLC
    security
                                         WEP             MAC
         802.11f                       MAC               Mgmt
Inter Access Point Protocol
                       802.11e                                    MIB
                 QoS enhancements
                                            PHY
                                     DSSS      FH   IR
                                                           OFDM
                                    802.11b
                                    5,11 Mbps
                                                           802.11a
                                                          6,9,12,18,24
                                    802.11g              36,48,54 Mbps
                                    20+ Mbps
                                                                         111
  802.11 Market Evolution
                                802.11
Warehouses
Factory floors
Medical
                                                 113
Worldwide WLAN sales
                       114
802.16 (WiMaX) Overview
Motivation for 802.16
 Broadband:
  – A transmission facility having a bandwidth sufficient to
    carry multiple voice, video or data, simultaneously.
  – High-capacity fiber to every user is expensive.
                                                         116
IEEE 802.16
 WirelessMAN air interface
  – for fixed point to multi-point BWA
                                               117
802.16 Architecture
                      118
Channel model
 Two Channels: Downlink and Uplink
 Supports both Time Division Duplexing and
  Frequency Division Duplexing
                                                 119
Network initialization of SS
                                                     120
Bandwidth requests and grants
 Ways
   – Bandwidth request packet.
   – Piggybacking bandwidth request with normal data
     packet.
 Request can be made during time slot assigned by base
  station for sending request or data.
 Grant modes
   – Grant per connection.
   – Grant per subscriber station.
 Grant per subscriber station is more efficient and scalable
  but complex than Grant per connection.
                                                       121
Uplink scheduling services
 Unsolicited grant service
   – Support applications generating constant bit rate traffic
     periodically.
   – Provides fixed bandwidth at periodic intervals.
 Best effort
   – Offers no guarantee.                                         122
802.16: Summary
 Higher throughput at longer ranges (up to 50 km)
   – Better bits/second/Hz at longer ranges
 Coverage
   – Standards-based mesh and smart antenna support
   – Adaptive modulation enables tradeoff of bandwidth for range
 Quality of Service
   – Grant / request MAC supports voice and video
   – Differentiated service levels: E1/T1 for business, best effort for
     residential
                                                                     123
  IEEE 802.16 Standard
                      802.16                   802.16a/REVd                       802.16e
Channel Conditions Line of sight only Non line of sight Non line of sight
                                                                                                124
802.11 Internals
Wireless LANs vs. Wired LANs
                                                    126
Wireless Media
 Physical layers used in wireless networks
   – have neither absolute nor readily observable boundaries
     outside which stations are unable to receive frames
   – are unprotected from outside signals
   – communicate over a medium significantly less reliable
     than the cable of a wired network
   – have dynamic topologies
   – lack full connectivity and therefore the assumption
     normally made that every station can hear every other
     station in a LAN is invalid (i.e., STAs may be “hidden”
     from each other)
   – have time varying and asymmetric propagation properties
                                                        127
Infrastructure vs. Ad hoc WLANs
  infrastructure
   network
                                    AP: Access Point
                      AP
               AP   wired network
                                        AP
ad-hoc network
                                                          128
                                                       Source: Schiller
IEEE 802.11
     Wireless LAN standard defined in the unlicensed
      spectrum (2.4 GHz and 5 GHz U-NII bands)
server
infrastructure network
access point
  application                                           application
     TCP                                                   TCP
       IP                                                   IP
      LLC                    LLC                           LLC
  802.11 MAC        802.11 MAC   802.3 MAC             802.3 MAC
  802.11 PHY        802.11 PHY   802.3 PHY             802.3 PHY
                                                                      130
Functional Diagram
                     131
      802.11 - Layers and functions
                                      Station Management
         LLC                                            – channel selection, MIB
DLC
                                                      Station Management
         MAC         MAC Management
                                                        – coordination of all
         PLCP                                             management functions
PHY
                     PHY Management
         PMD
                                                                               132
 802.11 - infrastructure network
                                                 Station (STA)
        802.11 LAN                                – terminal with access
                                     802.x LAN
                                                    mechanisms to the wireless
                                                    medium and radio contact to the
                                                    access point
STA1
       BSS1                                      Basic Service Set (BSS)
               Access                Portal       – group of stations using the same
                Point                               radio frequency
                                                 Access Point
                  Distribution System
                                                  – station integrated into the
                         Access                     wireless LAN and the distribution
ESS                       Point                     system
                                                 Portal
               BSS2
                                                  – bridge to other (wired) networks
                                                 Distribution System
                                                  – interconnection network to form
                                                    one logical network (EES:
        STA2            802.11 LAN      STA3        Extended Service Set) based
                                                    on several BSS
                                                                                 133
                                                                             Source: Schiller
Distribution System (DS) concepts
 The Distribution system interconnects multiple BSSs
 802.11 standard logically separates the wireless
  medium from the distribution system – it does not
  preclude, nor demand, that the multiple media be
  same or different
 An Access Point (AP) is a STA that provides access
  to the DS by providing DS services in addition to
  acting as a STA.
 Data moves between BSS and the DS via an AP
 The DS and BSSs allow 802.11 to create a wireless
  network of arbitrary size and complexity called the
  Extended Service Set network (ESS)
                                                    134
Extended Service Set network
                                      135
                               Source: Intersil
802.11 - Physical layer
 3 versions of spread spectrum: 2 radio (typ. 2.4 GHz), 1 IR
   – data rates 1 or 2 Mbps
 FHSS (Frequency Hopping Spread Spectrum)
   – spreading, despreading, signal strength, typically 1 Mbps
   – min. 2.5 frequency hops/s (USA), two-level GFSK modulation
 DSSS (Direct Sequence Spread Spectrum)
   – DBPSK modulation for 1 Mbps (Differential Binary Phase Shift
      Keying), DQPSK for 2 Mbps (Differential Quadrature PSK)
   – preamble and header of a frame is always transmitted with 1
      Mbps, rest of transmission 1 or 2 Mbps
   – chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1
      (Barker code)
   – max. radiated power 1 W (USA), 100 mW (EU), min. 1mW
 Infrared
   – 850-950 nm, diffuse light, typ. 10 m range
   – carrier detection, energy detection, synchronization
                                                               136
Spread-spectrum communications
                                       137
                                 Source: Intersil
DSSS Barker Code modulation
                                  138
                              Source: Intersil
DSSS properties
                      139
                  Source: Intersil
802.11 - MAC layer
  Traffic services
    – Asynchronous Data Service (mandatory) – DCF
    – Time-Bounded Service (optional) - PCF
  Access methods
    – DCF CSMA/CA (mandatory)
       • collision avoidance via randomized back-off mechanism
       • ACK packet for acknowledgements (not for broadcasts)
    – DCF w/ RTS/CTS (optional)
       • avoids hidden/exposed terminal problem, provides
         reliability
    – PCF (optional)
       • access point polls terminals according to a list
                                                             140
802.11 - CSMA/CA
                                                     contention window
    DIFS                         DIFS                (randomized back-off
                                                     mechanism)
                 direct access if                                     t
                 medium is free  DIFS         slot time
                                                                     141
802.11 DCF – basic access
  If medium is free for DIFS time, station sends data
  receivers acknowledge at once (after waiting for SIFS) if the
   packet was received correctly (CRC)
  automatic retransmission of data packets in case of
   transmission errors
             DIFS
                         data
sender
                                    SIFS
                                           ACK
receiver
                                                 DIFS
other                                                    data
stations                                                           t
                            waiting time    contention
                                                                       142
      802.11 –RTS/CTS
 If medium is free for DIFS, station can send RTS with reservation
  parameter (reservation determines amount of time the data packet
  needs the medium)
 acknowledgement via CTS after SIFS by receiver (if ready to receive)
 sender can now send data at once, acknowledgement via ACK
 other stations store medium reservations distributed via RTS and CTS
           DIFS
                  RTS                     data
sender
                        SIFS                     SIFS
                               CTS SIFS                 ACK
receiver
                                                                                143
802.11 - Carrier Sensing
  In IEEE 802.11, carrier sensing is performed
    – at the air interface (physical carrier sensing), and
    – at the MAC layer (virtual carrier sensing)
  Physical carrier sensing
    – detects presence of other users by analyzing all detected
       packets
    – Detects activity in the channel via relative signal strength
       from other sources
  Virtual carrier sensing is done by sending MPDU duration
   information in the header of RTS/CTS and data frames
  Channel is busy if either mechanisms indicate it to be
  Duration field indicates the amount of time (in microseconds)
   required to complete frame transmission
  Stations in the BSS use the information in the duration field to
   adjust their network allocation vector (NAV)
                                                                      144
802.11 - Collision Avoidance
 If medium is not free during DIFS time..
 Go into Collision Avoidance: Once channel becomes
  idle, wait for DIFS time plus a randomly chosen
  backoff time before attempting to transmit
 For DCF the backoff is chosen as follows:
   – When first transmitting a packet, choose a backoff interval
     in the range [0,cw]; cw is contention window, nominally 31
   – Count down the backoff interval when medium is idle
   – Count-down is suspended if medium becomes busy
   – When backoff interval reaches 0, transmit RTS
   – If collision, then double the cw up to a maximum of 1024
 Time spent counting down backoff intervals is part of
  MAC overhead
                                                                   145
Example - backoff
   B1 = 25              B1 = 5
               wait               data
              data                   wait
   B2 = 20              B2 = 15             B2 = 10
                                                  146
Backoff - more complex example
             DIFS          DIFS                DIFS                   DIFS
                                  boe   bor             boe bor              boe   busy
station1
                                  boe   busy
station2
                    busy
station3
busy medium not idle (frame, ack etc.) boe elapsed backoff time
                                                                                          147
                                                                                     Source: Schiller
802.11 - Priorities
 defined through different inter frame spaces – mandatory idle
  time intervals between the transmission of frames
 SIFS (Short Inter Frame Spacing)
   – highest priority, for ACK, CTS, polling response
   – SIFSTime and SlotTime are fixed per PHY layer (10 s and 20
     s respectively in DSSS)
 PIFS (PCF IFS)
   – medium priority, for time-bounded service using PCF
   – PIFSTime = SIFSTime + SlotTime
 DIFS (DCF IFS)
   – lowest priority, for asynchronous data service
   – DCF-IFS: DIFSTime = SIFSTime + 2xSlotTime
                                                            148
Solution to Hidden Terminals
           RTS               RTS
    D                A                   B                C
                              CTS              CTS
                             DATA
                                                              149
802.11 - Reliability
 Use acknowledgements
  – When B receives DATA from A, B sends an ACK
  – If A fails to receive an ACK, A retransmits the DATA
  – Both C and D remain quiet until ACK (to prevent collision of
    ACK)
  – Expected duration of transmission+ACK is included in
    RTS/CTS packets
          RTS                RTS
   D                A                   B                 C
                             CTS               CTS
                            DATA
ACK
                                                               150
802.11 - Congestion Control
           DIFS
                  RTS                     frag1                      frag2
sender
                        SIFS                      SIFS                       SIFS
                               CTS SIFS                  ACK1 SIFS                  ACK2
receiver
                                   NAV (RTS)
                                       NAV (CTS)
                                                             NAV (frag1)                   DIFS
other                                                            NAV (ACK1)                        data
stations                                                                                                t
                                                                                    contention
                                                                                                  152
802.11 - MAC management
 Synchronization
   – try to find a LAN, try to stay within a LAN
   – timer etc.
 Power management
   – sleep-mode without missing a message
   – periodic sleep, frame buffering, traffic measurements
 Association/Reassociation
   – integration into a LAN
   – roaming, i.e. change networks by changing access points
   – scanning, i.e. active search for a network
 MIB - Management Information Base
   – managing, read, write
                                                               153
802.11 - Synchronization
                                                               154
Synchronization using a Beacon
(infrastructure mode)
beacon interval
          B                     B               B                   B
 access
 point
                busy     busy          busy                  busy
 medium
                                                                        t
              value of the timestamp    B     beacon frame
                                                                         155
                                                                    Source: Schiller
Synchronization using a Beacon
(ad-hoc mode)
beacon interval
           B1                                                     B1
station1
                               B2             B2
station2
                                                                           156
802.11 - Power management
 Idea: switch the transceiver off if not needed
 States of a station: sleep and awake
 Timing Synchronization Function (TSF)
   – stations wake up at the same time
 Infrastructure
   – Traffic Indication Map (TIM)
      • list of unicast receivers transmitted by AP
   – Delivery Traffic Indication Map (DTIM)
      • list of broadcast/multicast receivers transmitted by AP
 Ad-hoc
   – Ad-hoc Traffic Indication Map (ATIM)
      • announcement of receivers by stations buffering frames
      • more complicated - no central AP
      • collision of ATIMs possible (scalability?)
                                                                  157
802.11 - Energy Conservation
 Power Saving in infrastructure mode
  – Nodes can go into sleep or standby mode
  – An Access Point periodically transmits a beacon
    indicating which nodes have packets waiting for them
  – Each power saving (PS) node wakes up periodically
    to receive the beacon
  – If a node has a packet waiting, then it sends a PS-
    Poll
     • After waiting for a backoff interval in [0,CWmin]
  – Access Point sends the data in response to PS-poll
                                                           158
Power saving with wake-up patterns
(infrastructure)
          TIM interval          DTIM interval
          D B                   T               T       d                D B
access
point
                 busy    busy           busy                      busy
medium
                                                    p       d
station
                                                                                t
           T    TIM      D   DTIM               awake
                                                                                 159
                                                                           Source: Schiller
Power saving with wake-up patterns
(ad-hoc)
               ATIM
               window          beacon interval
               B1                                     A       D        B1
station1
                                 B2              B2       a       d
station2
                                                                                 t
   B   beacon frame       random delay       A transmit ATIM          D transmit data
                                                                                     160
   802.11 - Frame format
         Types
           – control frames, management frames, data frames
         Sequence numbers
           – important against duplicated frames due to lost ACKs
         Addresses
           – receiver, transmitter (physical), BSS identifier, sender (logical)
         Miscellaneous
           – sending time, checksum, frame control, data
bytes  2         2        6       6       6        2       6      0-2312    4
    Frame     Duration Address Address Address Sequence Address
                                                                   Data    CRC
    Control     ID        1       2       3     Control    4
                                                                           161
  802.11 frame: addressing
   2       2        6      6        6        2      6      0 - 2312     4
frame            address address address    seq address
        duration                                            payload    CRC
control             1       2       3      control 4
                                                                            162
802.11 frame: addressing
                                                                Internet
             H1                         R1 router
                              AP
802.3 frame
                                    802.11 frame
                                                                             163
802.11 frame: more
                                                             frame seq #
                   duration of reserved
                                                             (for reliable ARQ)
                   transmission time (RTS/CTS)
    2      2           6        6        6         2         6        0 - 2312        4
frame            address address address          seq address
        duration                                                      payload     CRC
control             1       2       3            control 4
    2          2           4        1        1     1     1        1        1      1          1
Protocol                            To   From More               Power More
           Type       Subtype                          Retry                     WEP        Rsvd
version                             AP    AP   frag               mgt  data
                   frame type
                   (RTS, CTS, ACK, data)
                                                                                      164
Types of Frames
 Control Frames
  – RTS/CTS/ACK
  – CF-Poll/CF-End
 Management Frames
  –   Beacons
  –   Probe Request/Response
  –   Association Request/Response
  –   Dissociation/Reassociation
  –   Authentication/Deauthentication
  –   ATIM
 Data Frames
                                        165
802.11 - Roaming
  Bad connection in Infrastructure mode? Perform:
  scanning of environment
    – listen into the medium for beacon signals or send probes into
      the medium and wait for an answer
  send Reassociation Request
    – station sends a request to a new AP(s)
  receive Reassociation Response
    – success: AP has answered, station can now participate
    – failure: continue scanning
  AP accepts Reassociation Request and
    – signals the new station to the distribution system
    – the distribution system updates its data base (i.e., location
      information)
    – typically, the distribution system now informs the old AP so it
      can release resources
                                                                    166
802.11 - Roaming within same subnet
 H1 remains in same IP
  subnet: IP address can                            router
  remain same
                                                      hub or
 switch: which AP is                                 switch
  associated with H1?
                                     BBS 1
   – self-learning
   – switch will see frame from H1           AP 1
     and “remember” which switch
                                                               AP 2
     port can be used to reach H1
                                              H1                 BBS 2
                                                                      167
802.11 - Point Coordination Function
                                       168
Coexistence of PCF and DCF
 A Point Coordinator (PC) resides in the Access Point and
  controls frame transfers during a Contention Free Period
  (CFP)
 A CF-Poll frame is used by the PC to invite a station to
  send data. Stations are polled from a list maintained by
  the PC
 The CFP alternates with a Contention Period (CP) in
  which data transfers happen as per the rules of DCF
 This CP must be large enough to send at least one
  maximum-sized packet including RTS/CTS/ACK
 CFPs are generated at the CFP repetition rate
 The PC sends Beacons at regular intervals and at the
  start of each CFP
 The CF-End frame signals the end of the CFP
                                                        169
CFP structure and Timing
                           170
802.11 - PCF I
                t0 t1
                                         SuperFrame
                                                                          171
                                                                     Source: Schiller
802.11 - PCF II
t2 t3 t4
                     PIFS                      SIFS
                D3          D4                        CFend
  point
  coordinator                    SIFS
                                          U4
  wireless
  stations
  stations‘                         NAV
  NAV                 contention free period                       contention        t
                                                                   period
                                                                                         172
Throughput – DCF vs. PCF
                                                        173
   174
ICCC 2002
WLAN: IEEE 802.11b
                                      Connection set-up time
 Data rate                               – Connectionless/always on
    – 1, 2, 5.5, 11 Mbit/s,           Quality of Service
      depending on SNR
                                          – Typ. Best effort, no
    – User data rate max. approx. 6
                                            guarantees (unless polling is
      Mbit/s                                used, limited support in
 Transmission range                        products)
    – 300m outdoor, 30m indoor        Manageability
    – Max. data rate ~10m indoor          – Limited (no automated key
 Frequency                                 distribution, sym. Encryption)
    – Free 2.4 GHz ISM-band           Special
 Security                                – Advantage: many installed
    – Limited, WEP insecure, SSID           systems, lot of experience,
                                            available worldwide, free ISM-
 Cost                                      band, many vendors,
    – 100$ adapter, 250$ base               integrated in laptops, simple
      station, dropping                     system
 Availability                            – Disadvantage: heavy
    – Many products, many vendors           interference on ISM-band, no
                                            service guarantees, slow
                                            relative speed only       175
 IEEE 802.11b – PHY frame formats
Long PLCP PPDU format
           128            16      8         8      16      16         variable           bits
    synchronization     SFD     signal service length HEC             payload
96 µs 2, 5.5 or 11 Mbit/s
                                                                                                176
Channel selection (non-overlapping)
Europe (ETSI)
                                                               177
WLAN: IEEE 802.11a
   Data rate
     – 6, 9, 12, 18, 24, 36, 48, 54 Mbit/s, depending
                                                               Connection set-up time
       on SNR                                                    – Connectionless/always on
     – User throughput (1500 byte packets): 5.3 (6),
       18 (24), 24 (36), 32 (54)                               Quality of Service
     – 6, 12, 24 Mbit/s mandatory                                – Typ. best effort, no guarantees
   Transmission range                                             (same as all 802.11 products)
     – 100m outdoor, 10m indoor
           • E.g., 54 Mbit/s up to 5 m, 48 up to 12 m, 36      Manageability
             up to 25 m, 24 up to 30m, 18 up to 40 m, 12
             up to 60 m                                          – Limited (no automated key
   Frequency                                                      distribution, sym. Encryption)
     – Free 5.15-5.25, 5.25-5.35, 5.725-5.825 GHz
       ISM-band
                                                               Special
   Security                                                    Advantages/Disadvantages
     – Limited, WEP insecure, SSID                               – Advantage: fits into 802.x
   Cost                                                           standards, free ISM-band,
     – 280$ adapter, 500$ base station
                                                                   available, simple system, uses
   Availability
                                                                   less crowded 5 GHz band
     – Some products, some vendors
                                                                 – Disadvantage: stronger shading
                                                                   due to higher frequency, no QoS
                                                                                                178
IEEE 802.11a – PHY frame format
PLCP header
                                                                                     179
OFDM in IEEE 802.11a
 OFDM with 52 used subcarriers (64 in total)
 48 data + 4 pilot
 312.5 kHz spacing
                   pilot                       312.5 kHz
                                                                        180
  Operating channels for 802.11a
             36     40    44    48      52     56   60      64       channel
5150         5180 5200 5220 5240 5260 5280 5300 5320                   5350 [MHz]
         16.6 MHz
                                                         center frequency =
                                                         5000 + 5*channel number [MHz]
       149    153   157   161        channel
                                                                                    181
WLAN: IEEE 802.11e
 802.11e: MAC Enhancements – QoS
  – Enhance the current 802.11 MAC to expand support
    for applications with Quality of Service requirements,
    and in the capabilities and efficiency of the protocol.
 EDCF
  – Contention Window based prioritization
     • Real-time
     • Best effort
  – Virtual collision resolved in favor of higher priority
                                                             182
   Extending DCF: EDCF
                                       EDCF improves upon DCF by
FTP flows + unprioritised                prioritising traffic
VoIP: larger contention                 Each traffic class can have
window
                                         a different contention
                              Access     window
                                to      Different traffic classes to
                              channe     use different interframe
                                 l       spaces, called Arbitration
Prioritised VoIP calls : smaller         Interframe Space (AIFS)
contention window
                                                               184
Mobile IP
            185
Traditional Routing
  A routing protocol sets up a routing table in routers
 Issues
    – Frequent route changes
       • amount of data transferred between route changes may
         be much smaller than traditional networks
    – Route changes may be related to host movement
    – Low bandwidth links
                 MN       Router
      S
                            3
                  Home
                  agent
      Router     Router
        1          2
                                   189
Mobile IP: Basic Idea
move
                                Router
      S                                       MN
                                  3
Foreign agent
Home agent
                                                190
Mobile IP: Terminology
  Mobile Node (MN)
     – node that moves across networks without changing its IP address
  Home Agent (HA)
     – host in the home network of the MN, typically a router
     – registers the location of the MN, tunnels IP packets to the COA
  Foreign Agent (FA)
     – host in the current foreign network of the MN, typically a router
     – forwards tunneled packets to the MN, typically the default router
       for MN
  Care-of Address (COA)
     – address of the current tunnel end-point for the MN (at FA or MN)
     – actual location of the MN from an IP point of view
  Correspondent Node (CN)
     – host with which MN is “corresponding” (TCP connection)
                                                                           191
Data transfer to the mobile system
               HA
                    2
                                                                      MN
                                                      FA    foreign
                                                            network
                                                                   192
                                                               Source: Schiller
Data transfer from the mobile system
             HA
                                                       1      MN
                                              FA    foreign
                                                    network
                                                           193
                                                       Source: Schiller
Mobile IP: Basic Operation
  Agent Advertisement
    – HA/FA periodically send advertisement messages into their
      physical subnets
    – MN listens to these messages and detects, if it is in
      home/foreign network
    – MN reads a COA from the FA advertisement messages
  MN Registration
    – MN signals COA to the HA via the FA
    – HA acknowledges via FA to MN
    – limited lifetime, need to be secured by authentication
  HA Proxy
    – HA advertises the IP address of the MN (as for fixed systems)
    – packets to the MN are sent to the HA
    – independent of changes in COA/FA
  Packet Tunneling
    – HA to MN via FA                                          194
Mobile IP: Other Issues
  Reverse Tunneling
   – firewalls permit only “topological correct“ addresses
   – a packet from the MN encapsulated by the FA is now
     topological correct
  Optimizations
   – Triangular Routing
      • HA informs sender the current location of MN
   – Change of FA
      • new FA informs old FA to avoid packet loss, old FA now
        forwards remaining packets to new FA
                                                             195
Mesh and Adhoc Networks
                          196
Multi-Hop Wireless
                                                             197
Mobile Ad Hoc Networks (MANET)
 Host movement frequent
 Topology change frequent
       A                                          B
                   B            A
                                                          198
MAC in Ad hoc networks
                                                      199
Exposed Terminal Problem
                                A      B
                D
                        C
   – A starts sending to B.
   – C senses carrier, finds medium in use and has to
     wait for A->B to end.
   – D is outside the range of A, therefore waiting is not
     necessary.
   – A and C are “exposed” terminals
                                                       200
Distance-vector & Link-state Routing
                                                      201
Distance Vector Routing: Example
                                   202
Link State Routing: Example
                              203
MANET Routing Protocols
 Proactive protocols
   –   Traditional distributed shortest-path protocols
   –   Maintain routes between every host pair at all times
   –   Based on periodic updates; High routing overhead
   –   Example: DSDV (destination sequenced distance vector)
 Reactive protocols
   – Determine route if and when needed
   – Source initiates route discovery
   – Example: DSR (dynamic source routing)
 Hybrid protocols
   – Adaptive; Combination of proactive and reactive
   – Example : ZRP (zone routing protocol)
                                                               204
Dynamic Source Routing (DSR)
 Route Discovery Phase:
   – Initiated by source node S that wants to send packet to
     destination node D
   – Route Request (RREQ) floods through the network
   – Each node appends own identifier when forwarding RREQ
 Route Reply Phase:
   – D on receiving the first RREQ, sends a Route Reply (RREP)
   – RREP is sent on a route obtained by reversing the route
     appended to received RREQ
   – RREP includes the route from S to D on which RREQ was
     received by node D
 Data Forwarding Phase:
   – S sends data to D by source routing through intermediate nodes
                                                               205
Route discovery in DSR
                                                              Y
                                                          Z
                  S           E
                                      F
          B
                      C                               M           L
                                              J
     A                            G
              H                                   D
                                          K
                          I                                   N
                                                                  206
   Route discovery in DSR
                                                                          Y
Broadcast transmission
                                  [S]                                 Z
                              S           E
                                                  F
                      B
                                  C                               M           L
                                                          J
              A                               G
                          H                                   D
                                                      K
                                      I                                   N
                                                           Z
                   S               [S,E]
                               E
                                       F
           B
                       C                               M           L
                                               J
     A                 [S,C]       G
               H                                   D
                                           K
                           I                                   N
                                                            Z
                   S           E
                                                   [S,E,F,J,M]
                                       F
           B
                       C                                M           L
                                               J
     A                             G
               H                                    D
                                           K
                           I                                    N
                                                         Z
                 S               RREP [S,E,F,J,D]
                             E
                                     F
         B
                     C                               M           L
                                             J
     A                           G
             H                                   D
                                         K
                         I                                   N
                         DATA [S,E,F,J,D]                    Z
                     S           E
                                         F
             B
                         C                               M           L
                                                 J
       A                             G
                 H                                   D
                                             K
                             I                                   N
                                                                   212
DSDV
                                               213
DSDV example
 When X receives information from Y about a route to Z
   – Let destination sequence number for Z at X be S(X), S(Y) is
     sent from Y
X Y Z
                                                                   214
Protocol Trade-offs
 Proactive protocols
   –   Always maintain routes
   –   Little or no delay for route determination
   –   Consume bandwidth to keep routes up-to-date
   –   Maintain routes which may never be used
 Reactive protocols
   –   Lower overhead since routes are determined on demand
   –   Significant delay in route determination
   –   Employ flooding (global search)
   –   Control traffic may be bursty
                                                                 215
TCP over wireless
                    216
Impact of transmission errors
                                             217
Split connection approach
FH BS MH
                                         wireless                 219
Snoop protocol
 Buffers data packets at the base station BS
  – to allow link layer retransmission
 When dupacks received by BS from MH
  – retransmit on wireless link, if packet present in buffer
  – drop dupack
FH BS MH
                                                         220
Snoop protocol
TCP connection
          FH             BS                       MH
                                wireless
                                                         221
Impact of handoffs
                                                               222
M-TCP
 Similar to the split connection approach, M-TCP
  splits one TCP connection into two logical parts
  – the two parts have independent flow control as in I-
    TCP
 The BS does not send an ack to MH, unless BS
  has received an ack from MH
  – maintains end-to-end semantics
 BS withholds ack for the last byte ack’d by MH
              Ack 999        Ack 1000
FH BS MH
                                                       223
M-TCP
                                              224
TCP in MANET
Several factors affect TCP performance in MANET:
                No
                throughput
                             No throughput
                             despite route repair
                                             229
Wireless Network Management
   –   Roaming.
   –   Persistence of Mobile Units.
   –   Lack of SNMP Agents in Mobile Units.
   –   Mobile Adhoc Networks.
                                              230
Wireless security
                    231
Threats
                                              232
Vulnerabilities
 Wired Equivalent Privacy (WEP) encryption
  standard is weak
 Radio signals susceptible to jamming and
  interference
 Protocol vulnerabilities allow
  – Network sessions to be taken over by an intruder
  – Injection of invalid data into network traffic
  – Network reconnaissance
 Default configurations create “open” network
                                                       233
Vulnerabilities - 1
                         234
  Vulnerabilities - 2
                            235
Vulnerabilities - 3
Example: These
packet traces show
highly confidential
data that can be
captured from a
wireless network
                      236
 Wireless security technologies
                                  •SET for transaction security
                                  •S/MIME and PGP for secure email
                   Applications   •Java security (sandboxes)
Can use                           •Database security
higher level
services to
compensate                        •SSL and TLS
for lower layers   Middleware     •Web security (HTTPS, PICS, HTTP Headers)
                                  •Proxy server security
Tradeoffs in
performance
and security       TCP/IP
                                     •IPSEC and wirless VPN
                                     •Mobile IP
                                                                                Data
                              802.1 Bridging
                                                                                Link
                                                                                Layer
                                                                                        241
IEEE 802.16
 Purpose:
   – to enable rapid worldwide deployment of cost-effective
     broadband wireless access products
 802.16:
   – consists of the BS (Base Station) and SSs(Subscriber Stations)
   – All data traffic goes through the BS, and the BS can control the
     allocation of bandwidth on the radio channel.
   – 802.16 is a Bandwidth on Demand system.
 Standard specifies:
   – The air interface, MAC (Medium Access Control), PHY(Physical
     layer)
                                                                  242
IEEE 802.16
  The spectrum to be used
   – 10 - 66 GHz licensed band
      • Due to the short wavelength
         – Line of sight is required
         – Multipath is negligible
      • Channels 25 or 28 MHz wide are typical
      • Raw data rates in excess of 120 Mbps
   – 2 -11 GHz
      • IEEE Standards Association Project P802.16a
      • Approved as an IEEE standard on Jan 29, 2003
                                                  243
IEEE 802.16 MAC layer function
 Transmission scheduling :
   – Controls up and downlink transmissions so that
     different QoS can be provided to each user
 Admission control :
   – Ensures that resources to support QoS requirements of
     a new flow are available
 Link initialization:
   – Scans for a channel, synchronizes the SS with the BS,
     performs registration, and various security issues.
 Support for integrated voice/data connections:
   – Provide various levels of bandwidth allocation, error
     rates, delay and jitter
                                                             244
Basic services
 UGS(Unsolicited Grant Service)
   – Supports real-time service flows that generate fixed size data
     packets on a periodic basis, such as T1/E1 and Voice over IP
   – The BS shall provide fixed size slot at periodic intervals.
 rtPS(Real-Time Polling Service)
   – Supports real-time service flows that generate variable size data
     packets on a periodic basis, such as MPEG video
                                                                  245
FDD based MAC protocol
 Downlink
  – Broadcast phase : The information about uplink and
    downlink structure is announced.
  – DL-MAP(Downlink Map)
     • DL-MAP defines the access to the downlink information
  – UL-MAP(Uplink Map)
     • UL-MAP message allocates access to the uplink channel
 Uplink
  – Random access area is primarily used for the initial
    access but also for the signalling when the terminal
    has no resources allocated within the uplink phase.
                                                               246
FDD based 802.16 MAC Protocol
              MAC Frame MAC Frame MAC Frame
                             Movable boundary
   Downlink
   Carrier
              Broadcast Phase                        Downlink Phase
                 Broadcast                          Reserved
                                                Movable boundary
   Uplink
   Carrier    Uplink Phase                              Random Access Phase
                              Reserved                         Contention
                                                                            247
Time relevance of PHY and MAC control information
                                          Frame n-1                             Frame n
               DL-MAP n-1
                   UL-MAP n-1
    Downlink
    Subframe
    Uplink
    Subframe
                                                                                          248
Downlink Scheduling
VCC 2 (Source 2) 2 2 1 3 3 1 3 2 1 3 3 1 3 2 1
                               3
                                       WRR
VCC 3 (Source 3)   3 3 3 3 3
                                       scheduler
                                                                         250
VT
  VT : aims to emulate the TDM(Time Division Multiplexing) system
    – connection 1 : reserves 50% of the link bandwidth
    – connection 2, 3 : reserves 20% of the link bandwidth
                                             Connection 1
                                            Average inter-arrival : 2 units
                                             Connection 2
                                            Average inter-arrival : 5 units
                                             Connection 3
                                            Average inter-arrival : 5 units
                                           First-Come-First-Served
                                                    service order
Virtual times
                                                                        251
Uplink Scheduling
  Uplink scheduling:
     – Responsible for the efficient and fair allocation of the
       resources(time slots) in the uplink direction
     – Uplink carrier :
         • Reserved slots
         • contention slots(random access slots)
     – The standard scheduling algorithms can be used
                                                                  252
Bandwidth allocation and request mechanisms
 nrtPS
   – The BS provides timely unicast request opportunities.
   – The SS is allowed to use contention request opportunities.
 BE
   – The SS is allowed to use contention request opportunities.
                                                                     254
Bandwidth Request-Grant Protocol
           SS1   4.
                 1. BS
                    BS allocates
                         allocates bandwidth
                                    bandwidth to
                                               to SSs
                                                  SSs
     2.1
     5.1            for
                    for transmitting
                        transmitting data   based on
                                      bandwidth
                    their bandwidth requests.
                    request.
      1
      4
BS               2.1Bandwidth    is also
                     SS1 transmits       allocated for
                                      bandwidth
                    requesting
                    requests. more bandwidth.
                 5.1
                 2.2 SS
                     SS12 transmits
                           transmits data   and
                                      bandwidth
     2.2
     5.2   SS2      bandwidth
                    requests. requests.
                 5.2 SS2 transmits data and
                    bandwidth requests.
                                                 255
Example
   Total Uplink Bytes =
   100
   2 SS and 1 BS
                              Flows:    UGS       rtPS   nrtPS   BE
SS1              SS2          1st Round 40         30      20    10
Demands:         Demands:                30        22      20    10
                              Excess Bytes = 18
UGS = 20         UGS = 10     2nd Round 30         22     20+12 10+6
rtPS = 12        rtPS = 10                30       22     32    16
                              Excess Bytes = 2
nrtPS = 15       nrtPS = 15   3rd Round   30       22     30      16+2
BE = 30          BE = 20                  30       22     30      18
                                   258
  Bandwidth and applications
            UMTS
             EDGE
   GPRS, CDMA 2000
         CDMA 2.5G
               2G
        Speed, kbps 9.6   14.4   28   64   144   384   2000
Transaction Processing
 Messaging/Text Apps
            Voice/SMS
      Location Services
 Still Image Transfers
  Internet/VPN Access
      Database Access
    Document Transfer
     Low Quality Video
    High Quality Video
                                                          259
Applications: network requirements
         Hig
           h                Streamin
                             g Video               Video
                                                Conferencing
                     E-mail with
    Requirements
                     Attachment
     Bandwidth
                          s
                                                          Voice
                                     Internet/
                                      intranet
                                  E-commerce
                         Text                     ERP
                           e-
                         mail
                                                      Terminal
           Lo                                          Mode
            w
                   Low          Latency Sensitivity          High
                                                                    260
Quality of Service
 Network-level QoS
   – Metrics include available b/w, packet loss rates, etc
   – Elements of a Network QoS Architecture
      • QoS specification (traffic classes)
      • Resource management and admission control
      • Service verification and traffic policing
      • Packet forwarding mechanisms (filters, shapers, schedulers)
      • QoS routing
 Application-level QoS
   – How well user expectations are qualitatively satisfied
   – Clear voice, jitter-free video, etc
   – Implemented at application-level:
      • end-to-end protocols (RTP/RTCP)
      • application-specific encodings (FEC)
                                                               261
QoS building blocks
 What kind of premium services?
   – Service/SLA design
 How much resources?
   – admission control/provisioning
 How to ensure network utilization, load balancing?
   – QoS routing, traffic engineering
 How to set aside resources in a distributed manner?
   – signaling, provisioning, policy
 How to deliver services when the traffic actually comes in?
   – traffic shaping, classification, scheduling
 How to monitor quality, account and price these services?
   – network management, accounting, billing, pricing
                                                        262
QoS big picture: Control/Data planes
Router
  Workstation                                                                                      Router
                      Router                          Internetwork or WAN                                   Workstation
                 Data Plane: Traffic conditioning (shaping, policing, marking etc) at the edge +
                Traffic Classification + Claiming Reserved Resources (Per-hop Behavior- PHB),
                                              scheduling, buffer management
                                                                                                                          263
Services: Queuing/Scheduling
       Traffic    Traffic
       Sources    Classes
  $$$$$$
                 Class A
 $$$             Class B
  $              Class C
                                                 264
QoS and pricing
 QoS Pricing
  – Multi-class network requires differential pricing
  – Otherwise all users select best service class
 Service provider’s perspective
  – Low cost (implementn, metering, accounting, billing)
  – Encourage efficient resource usage
  – Competitiveness and cost recovery
 User’s perspective
  – Fairness and Stability
  – Transparency and Predictability
  – Controllability
                                                        265
Multimedia applications
 Audio
  – Speech (CELP – type codecs)
  – Music (MP3, WAV, WMA, Real)
 Streaming
  – using HTTP/TCP (MP3)
  – using RTP/UDP (Video)
                                  266
          Multimedia protocol stack
MGCP/Megaco
                                                                                                    Application
                                                                                                     daemon
                                                     Reservation         Measurement
                                                                                       H.261, MPEG
          H.323         SDP           RTSP             RSVP                   RTCP
                        SIP                                                                RTP
                  TCP                                              UDP
rk
netwo
IPv4, IPv6
                                                                                                    el
                                                                                                    kern
          PPP           AAL3/4            AAL5                                             PPP
 li
 physic
                                                       268
SIP components
 User Agent Client (UAC)
  – End systems; Send SIP requests
 User Agent Server (UAS)
  – Listens for call requests
  – Prompts user or executes program to determine response
 User Agent: UAC plus UAS
 Registrar
  – Receives registrations regarding current user locations
 Redirect Server
  – Redirects users to try other server
 Proxy Server
                                                              269
SIP architecture
    Request
    Response                                  SIP Redirect
                                                 Server                Location Service
    Media
                             2
                                 3
                                                      5
                                 4
                                                          6
              1
                                                               7
                                     11
              12                                          10
                                          SIP Proxy
                        13                                                      SIP Proxy
                                                                   8
SIP Client
                   14
                                                                   9
                                                   SIP Client
                                              (User Agent Server)
                                                                                  270
SIP call flow example
 USER A                        PROXY                  PROXY                 USER B
               INVITE
          407 Proxy Authenticate
                ACK
               INVITE
                                         INVITE
              100 Trying                                        INVITE
                                        100 Trying
                                                              180 Ringing
                                        180 Ringing
              180 Ringing                                       200 OK
                                          200 OK
               200 OK
                ACK
                                           ACK
                                                                 ACK
                                       BOTH WAY RTP
                                                                 BYE
                                            BYE
                BYE
               200 OK                      200 OK
                                                                 200 OK
                                                                                 271
H.323
 H.323 is an ITU standard for multimedia
  communications over best-effort LANs.
 Part of larger set of standards (H.32X) for
  videoconferencing over data networks.
                                                272
H.323 architecture
                     273
H.323 components
 Terminals:
   – All terminals must support voice; video and data are optional
 Gatekeeper:
   – most important component which provides call control services
 Gateway:
   – an optional element which provides translation functions
     between H.323 conferencing endpoints (esp for ISDN, PSTN)
 Multipoint Control Unit (MCU):
   – supports conferences between three or more endpoints.
     Consists of a Multipoint Controller (MC) and Multipoint
     Processors (MP)
                                                                 274
H.323 Gatekeeper
 Address translation
  – H.323 Alias to transport (IP) address
 Admission control
  – Permission to complete call
  – Can apply bandwidth limits
  – Method to control LAN traffic
 Call signaling/management/reporting/logging
 Management of Gateway
  – H.320, H.324, POTS, etc.
                                                275
H.323 example
                                                     276
Media transport: RTP
 Transport of real-time data, audio and video
 RTP follows the application level framing (ALF)
  – RTP specifies common application functions
  – Tailored through modifications and/or additions to the
    headers
 RTP consists of a data and a control part
  – The data part of RTP is a thin protocol
  – The control part of RTP is called RTCP
     • quality-of-service feedback from receivers
     • snchronization support for media streams
                                                       277
RTP (contd)
 RTP services
  – payload type identification
  – sequence numbering, timestamping
  – delivery monitoring, optional mixing/translation.
                                                        278
Trends
         279
  3G Network Architecture
                                        Core Network
         Wireless
                                                                    Telephone
      Access Network
                                   Programmable                      Network
                                                     Gateway
                   Mobile Access     Softswitch
                      Router
                                                     Application
     IP Intranet                                       Server
                    Acces                             (HLR)
                                   IP Intranet
      IP            s Point                       User Profiles &
 Base Stations                                    Authentication
                         802.11
                                        802.11
   3G Air                                                      Wired Access
                                                   Internet
Interface
                                       Acces
                                       s Point
                                                                       280
Overlay Networks - the global goal
   integration of heterogeneous fixed and
   mobile networks with varying
   transmission characteristics
regional
   vertical
   handover
                                             metropolitan area
                              campus-based   horizontal
                                             handover
in-house
                                                                    281
 Future mobile and wireless networks
 Improved radio technology and antennas
   – smart antennas, beam forming, multiple-input multiple-output
     (MIMO)
      • space division multiplex to increase capacity, benefit from
         multipath
   – software defined radios (SDR)
      • use of different air interfaces, download new modulation/coding
      • requires a lot of processing power
   – dynamic spectrum allocation
      • spectrum on demand results in higher overall capacity
 Core network convergence
   – IP-based, quality of service, mobile IP
 Ad-hoc technologies
   – spontaneous communication, power saving, redundancy
                                                                  282
 References
 A.S. Tanenbaum. Computer Networks. Pearson Education, 2003.
 J. Schiller, Mobile Communications, Addison Wesley, 2002.
 Y-B. Lin and I Chlamtac, Wireless and Mobile Network Architectures,
  Wiley, 2001.
 Others websites:
   – www.palowireless.com
                                                                 283
Thank You
            284
285
286
287
288
289
290
291
292
293
294
295
296
297
298