Professional Documents
Culture Documents
Wireless Networking Technologies
Wireless Networking Technologies
Course Outline
Wireless Networks
RF Basics
Frequency, modulation
Medium access control
WiFi Overview
802.11 standards
Mobility support
Voice and QoS support
Basic elements
Standards and variants
WiMaX Overview
802.16 standard
Voice and QoS support
Trends
Basic elements
Sridhar Iyer
Overlay networks
IIT Bombay
Wireless Networks
Wireless networks
Access computing/communication services, on the move
Wireless WANs
Cellular Networks: GSM, GPRS, CDMA
Satellite Networks: Iridium
Wireless LANs
WiFi Networks: 802.11
Personal Area Networks: Bluetooth
Wireless MANs
WiMaX Networks: 802.16
Mesh Networks: Multi-hop WiFi
Adhoc Networks: useful when infrastructure not available
Sridhar Iyer
IIT Bombay
Sridhar Iyer
IIT Bombay
Mobile communication
Wireless vs. mobile
Examples
stationary computer
laptop in a hotel (portable)
wireless LAN in historic buildings
Personal Digital Assistant (PDA)
Sridhar Iyer
IIT Bombay
72 Mbps
72 Mbps
Turbo .11a
54 Mbps
802.11{a,b}
54 Mbps
5-11 Mbps
802.11b
5-11 Mbps
1-2 Mbps
802.11
1-2 Mbps Bluetooth
3G
WCDMA, CDMA2000
384 Kbps
384 Kbps
56 Kbps
56 Kbps
Sridhar Iyer
2G
Indoor
Outdoor
Mid range
outdoor
Long range
outdoor
Long distance
com.
10 30m
50 200m
200m 4Km
5Km 20Km
20m 50Km
IIT Bombay
Reference model
Application
Application
Transport
Transport
Network
Network
Network
Network
Data Link
Data Link
Data Link
Data Link
Physical
Physical
Physical
Physical
Medium
Radio
Sridhar Iyer
IIT Bombay
Transport
congestion and flow control
quality of service
Network
addressing and routing
device location, hand-over
Link
media access and security
Physical
transmission errors and interference
Sridhar Iyer
IIT Bombay
10
Perspectives
Network designers: Concerned with cost-effective
design
Need to ensure that network resources are efficiently utilized
and fairly allocated to different users.
IIT Bombay
11
RF Basics
Signals encoding
How to improve the data rate?
Error correction
How to ensure that bandwidth is not wasted?
Sridhar Iyer
IIT Bombay
13
coax cable
1 Mm
300 Hz
10 km
30 kHz
VLF
LF
optical transmission
100 m
3 MHz
MF
HF
1m
300 MHz
VHF
UHF
10 mm
30 GHz
SHF
EHF
100 m
3 THz
infrared
1 m
300 THz
visible light UV
IIT Bombay
14
1 GHz to 40 GHz
Directional beams possible
Suitable for point-to-point transmission
Used for satellite communications
IIT Bombay
15
IIT Bombay
16
Frequency regulations
Frequencies from 9KHz to 300 MHZ in high demand
(especially VHF: 30-300MHZ)
Two unlicensed bands
Industrial, Science, and Medicine (ISM): 2.4 GHz
Unlicensed National Information Infrastructure (UNII): 5.2 GHz
www.fcc.gov - US
www.etsi.org - Europe
www.wpc.dot.gov.in - India
www.itu.org - International co-ordination
IIT Bombay
17
Wireless transmission
Antenna
Antenna
Transmitter
Receiver
IIT Bombay
18
Transmitters
Amplifier
Antenna
Mixer
Filter
Amplifier
Source
Oscillator
Transmitter
Suppose you want to generate a signal that is sent at 900 MHz and
the original source generates a signal at 300 MHz.
Amplifier - strengthens the initial signal
Oscillator - creates a carrier wave of 600 MHz
Mixer - combines signal with oscillator and produces 900 MHz
(also does modulation, etc)
Filter - selects correct frequency
Amplifier - Strengthens the signal before sending it
Sridhar Iyer
IIT Bombay
19
Antennas
Antennas
An antenna is an electrical conductor or system of
conductors to send/receive RF signals
Transmission - radiates electromagnetic energy into space
Reception - collects electromagnetic energy from space
Omnidirectional Antenna
(lower frequency)
Sridhar Iyer
IIT Bombay
Directional Antenna
(higher frequency)
21
z
y
x
Sridhar Iyer
IIT Bombay
ideal
isotropic
radiator
22
/2
x
side view (xy-plane)
Sridhar Iyer
z
side view (yz-plane)
IIT Bombay
simple
dipole
Sridhar Iyer
directed
antenna
sectorized
antenna
IIT Bombay
24
Antenna models
In Omni Mode:
Nodes receive signals with gain Go
In Directional Mode:
Capable of beamforming in specified direction
Directional Gain Gd (Gd > Go)
Sridhar Iyer
IIT Bombay
25
Directional communication
Received Power (Transmit power)
*(Tx Gain) * (Rx Gain)
Directional gain is higher
IIT Bombay
26
Omni
Directional
Spatial Reuse
Low
High
Connectivity
Low
High
Interference
Omni
Directional
Low
High
Sridhar Iyer
IIT Bombay
27
Antennas: diversity
Grouping of 2 or more antennas
multi-element antenna arrays
Antenna diversity
switched diversity, selection diversity
receiver chooses antenna with largest output
diversity combining
combine output power to produce gain
cophasing needed to avoid cancellation
/4
/2
+
Sridhar Iyer
ground plane
IIT Bombay
/4
/2
/2
/2
+
28
Signals
physical representation of data
function of time and location
signal parameters: parameters representing the value of
data
classification
IIT Bombay
30
Transmission range
communication possible
low error rate
sender
Detection range
detection of the signal
possible
no communication
possible
transmission
distance
detection
Interference range
interference
IIT Bombay
31
Sridhar Iyer
IIT Bombay
32
Attenuation
Strength of signal falls off with distance over
transmission medium
Attenuation factors for unguided media:
Received signal must have sufficient strength so that
circuitry in the receiver can interpret the signal
Signal must maintain a level sufficiently higher than
noise to be received without error
Attenuation is greater at higher frequencies, causing
distortion
IIT Bombay
33
Signal propagation
Propagation in free space always like light (straight line)
Receiving power proportional to 1/d
(d = distance between sender and receiver)
Receiving power additionally influenced by
shadowing
Sridhar Iyer
reflection
refraction
IIT Bombay
scattering
diffraction
34
Multipath propagation
Signal can take many different paths between sender and receiver due to
reflection, scattering, diffraction
multipath
LOS pulses pulses
signal at sender
Sridhar Iyer
IIT Bombay
35
Effects of mobility
Channel characteristics change over time and location
signal paths change
different delay variations of different signal parts
different phases of signal parts
long term
fading
Additional changes in
distance to sender
obstacles further away
Sridhar Iyer
IIT Bombay
36
Propagation modes
Transmission
Antenna
a) Ground Wave Propagation
Signal
Earth
Receiving
Antenna
Ionosphere
Signal
b) Sky Wave Propagation
Earth
Signal
c) Line-of-Sight Propagation
Earth
Sridhar Iyer
IIT Bombay
37
Modulation
Digital modulation
digital data is translated into an analog signal (baseband)
ASK, FSK, PSK
differences in spectral efficiency, power efficiency, robustness
Analog modulation
shifts center frequency of baseband signal up to the radio carrier
Motivation
smaller antennas (e.g., /4)
Frequency Division Multiplexing
medium characteristics
Basic schemes
Amplitude Modulation (AM)
Frequency Modulation (FM)
Phase Modulation (PM)
Sridhar Iyer
IIT Bombay
38
digital
modulation
analog
baseband
signal
analog
modulation
radio transmitter
radio
carrier
analog
demodulation
analog
baseband
signal
synchronization
decision
digital
data
101101001
radio receiver
radio
carrier
Sridhar Iyer
IIT Bombay
39
Digital modulation
Modulation of digital signals known as Shift Keying
1
Amplitude Shift Keying (ASK):
very simple
low bandwidth requirements
very susceptible to interference
Sridhar Iyer
IIT Bombay
40
Multiplexing Mechanisms
Multiplexing
channels ki
k1
k3
k4
k5
k6
Multiplexing in 4 dimensions
k2
space (si)
c
t
time (t)
frequency (f)
code (c)
s1
s2
c
t
s3
IIT Bombay
42
Frequency multiplex
Separation of the whole spectrum into smaller frequency bands
A channel gets a certain band of the spectrum for the whole
time
Advantages:
no dynamic coordination
k1
k2
k3
k4
k5
k6
necessary
c
works also for analog signals
f
Disadvantages:
waste of bandwidth
if the traffic is
distributed unevenly
inflexible
guard spaces t
Sridhar Iyer
IIT Bombay
43
Time multiplex
A channel gets the whole spectrum for a certain
amount of time
Advantages:
only one carrier in the
medium at any time
throughput high even
for many users
k1
k2
k3
k4
k5
k6
c
f
Disadvantages:
precise
synchronization
t
necessary
Sridhar Iyer
IIT Bombay
44
IIT Bombay
45
Code multiplex
Each channel has a unique code
k
All channels use the same
spectrum at the same time
Advantages:
1
k2
k3
k4
k5
k6
bandwidth efficient
no coordination and synchronization
necessary
good protection against interference
and tapping
Disadvantages:
lower user data rates
more complex signal regeneration
IIT Bombay
46
CDMA Example
D = rate of data signal
Break each bit into k chips
Chips are a user-specific fixed pattern
Chip data rate of new channel = kD
dd2,
Su d<d1,
1 d3,
c1 d4,
d 2d5,
cd6>
2 d=3received
c3 dchip
4 cpattern
4 d 5 c5 d 6 c 6
<c1, c2, c3, c4, c5, c6> = senders code
Sridhar Iyer
IIT Bombay
47
CDMA Example
User A code = <1, 1, 1, 1, 1, 1>
To send a 1 bit = <1, 1, 1, 1, 1, 1>
To send a 0 bit = <1, 1, 1, 1, 1, 1>
IIT Bombay
48
interference
spread
signal
power
detection at
receiver
signal
spread
interference
Side effects:
coexistence of several signals without dynamic coordination
tap-proof
IIT Bombay
49
Spread-spectrum communications
Sridhar Iyer
IIT Bombay
50
Source: Intersil
dP/df
i)
user signal
broadband interference
narrowband interference
ii)
f
sender
dP/df
dP/df
dP/df
iii)
iv)
f
Sridhar Iyer
v)
f
receiver
IIT Bombay
51
DSSS properties
Sridhar Iyer
IIT Bombay
52
Source: Intersil
Advantages
user data
Disadvantages
precise power control necessary
Sridhar Iyer
IIT Bombay
XOR
tc
chipping
sequence
01101010110101
=
resulting
signal
01101011001010
DSSS Transmit/Receive
spread
spectrum
signal
user data
X
chipping
sequence
transmit
signal
modulator
radio
carrier
transmitter
correlator
received
signal
demodulator
radio
carrier
lowpass
filtered
signal
products
X
integrator
sampled
sums
data
decision
chipping
sequence
receiver
Sridhar Iyer
IIT Bombay
54
Sridhar Iyer
IIT Bombay
55
Two versions
Fast Hopping: several frequencies per user bit
Slow Hopping: several user bits per frequency
Advantages
frequency selective fading and interference limited to short period
simple implementation
uses only small portion of spectrum at any time
Disadvantages
not as robust as DSSS
simpler to detect
Sridhar Iyer
IIT Bombay
56
td
f3
slow
hopping
(3 bits/hop)
f2
f1
f
td
f3
fast
hopping
(3 hops/bit)
f2
f1
t
57
FHSS Transmit/Receive
narrowband
signal
user data
modulator
modulator
frequency
synthesizer
transmitter
received
signal
hopping
sequenc
e
Sridhar Iyer
spread
transmit
signal
narrowband
signal
demodulator
hopping
sequenc
e
data
demodulator
frequency
synthesizer
receiver
IIT Bombay
58
k3
Amplitude
subcarrier: sin(x)
SI function=
x
f
Sridhar Iyer
IIT Bombay
59
OFDM
Properties
Lower data rate on each subcarrier less ISI
interference on one frequency results in interference of one
subcarrier only
no guard space necessary
orthogonality allows for signal separation via inverse FFT on
receiver side
precise synchronization necessary (sender/receiver)
Advantages
no equalizer necessary
no expensive filters with sharp edges necessary
better spectral efficiency (compared to CDM)
Application
802.11a, HiperLAN2, ADSL
Sridhar Iyer
IIT Bombay
60
ALOHA
Stations transmit whenever they have data to send
Detect collision or wait for acknowledgment
If no acknowledgment (or collision), try again after a
random waiting time
Collision: If more than one node transmits at the
same time
If there is a collision, all nodes have to re-transmit
packets
Sridhar Iyer
IIT Bombay
61
Aloha/slotted Aloha
Mechanism
random, distributed (no central arbiter), time-multiplex
Slotted Aloha additionally uses time-slots, sending must
always start at slot boundaries
Aloha
collision
sender A
sender B
sender C
t
Slotted Aloha
collision
sender A
sender B
sender C
t
Sridhar Iyer
IIT Bombay
62
Slotted Aloha
Time is divided into slots
slot = one packet transmission time at least
Sridhar Iyer
IIT Bombay
63
Error control
Full Redundancy:
Send everything twice
Simple but inefficient
Common Schemes:
Parity
Cyclic Redundancy Check (CRC)
Checksum
Sridhar Iyer
IIT Bombay
65
Receiver
Separates incoming frame into data bits and check
bits
Calculates check bits from received data bits
Compares calculated check bits against received
check bits
Detected error occurs if mismatch
Sridhar Iyer
IIT Bombay
66
Solutions:
Forward Error Correction (FEC)
Use of redundancy for packet level error correction
Block Codes, Turbo Codes
Sridhar Iyer
IIT Bombay
67
IIT Bombay
68
IIT Bombay
69
Bandwidth
Amount of data that can be transmitted per unit time
expressed in cycles per second, or Hertz (Hz) for analog
devices
expressed in bits per second (bps) for digital devices
KB = 2^10 bytes; Mbps = 10^6 bps
Sridhar Iyer
IIT Bombay
71
Sridhar Iyer
IIT Bombay
72
Latency (delay)
Time it takes to send message from point A to point B
Latency = Propagation + Transmit
+ Queue
Propagation = Distance /
SpeedOfLight
Transmit = Size / Bandwidth
Queueing not relevant for direct links
Bandwidth not relevant if Size = 1 bit
Software overhead can dominate when Distance is small
IIT Bombay
73
Sridhar Iyer
IIT Bombay
74
Sridhar Iyer
IIT Bombay
75
TCP/IP Basics
Interconnection devices
Basic Idea: Transfer data from input to output
Repeater
Amplifies the signal received on input and transmits it on output
Switch
Reads destination address of each packet and forwards
appropriately to specific port
Layer 3 switches (IP switches) also perform routing functions
Router
decides routes for packets, based on destination address and
network topology
Exchanges information with other routers to learn network
topology
Sridhar Iyer
IIT Bombay
77
Switched networks
Sridhar Iyer
IIT Bombay
78
TCP/IP layers
Physical Layer:
Transmitting bits over a channel.
Deals with electrical and procedural interface to the
transmission medium.
IIT Bombay
79
Transport Layer:
end-to-end connection characteristics.
Deals with retransmissions, sequencing and
congestion control.
Sridhar Iyer
IIT Bombay
80
Sridhar Iyer
IIT Bombay
81
IIT Bombay
82
Header Processing
Lookup
IP Address
Update
Header
Buffer
Buffer
Memory
Memory
Address
Address
Table
Table
Data Hdr
Header Processing
Lookup
IP Address
Queue
Packet
Update
Header
NQueue
times line rate
Packet
Buffer
Buffer
Memory
Memory
Address
Address
Table
Table
Header Processing
Lookup
IP Address
Update
Header
Buffer
Buffer
Memory
Memory
Address
Address
Table
Table
Sridhar Iyer
Queue
Packet
IIT Bombay
83
14
Congestion
avoidance
12
10
Slow start
threshold
8
6
4
Slow start
2
0
0
IIT Bombay
84
RTT
Host A
Host B
one segm
en
two segm
ents
four segm
ents
time
Sridhar Iyer
IIT Bombay
85
Sridhar Iyer
RTT
Host A
Host B
four segm
ents
five segm
ents
time
IIT Bombay
86
10
advertised window
8
6
4
2
0
Time (round trips)
Sridhar Iyer
IIT Bombay
87
Wireless LANs
Infrared (IrDA) or radio links (Wavelan)
Advantages
very flexible within the reception area
Ad-hoc networks possible
(almost) no wiring difficulties
Disadvantages
low bandwidth compared to wired networks
many proprietary solutions
IIT Bombay
89
AP
AP
wired network
AP
ad-hoc network
Sridhar Iyer
IIT Bombay
90
Source: Schiller
Wireless LAN
B
C
A
IIT Bombay
91
Sridhar Iyer
IIT Bombay
92
Sridhar Iyer
IIT Bombay
93
IIT Bombay
94
Sridhar Iyer
IIT Bombay
95
RTS
RTS
D
CTS
CTS
DATA
Sridhar Iyer
IIT Bombay
97
Sridhar Iyer
BSS1
IIT Bombay
BSS2
98
STA1
Direct communication
within a limited range
STA3
BSS1
STA2
BSS2
STA5
STA4
Sridhar Iyer
Station (STA):
terminal with access
mechanisms to the
wireless medium
Basic Service Set (BSS):
group of stations using the
same radio frequency
802.11 LAN
IIT Bombay
99
Source: Schiller
802.11 LAN
STA1
802.x LAN
BSS1
Portal
Access
Point
Access
Point
ESS
Portal
bridge to other (wired) networks
BSS2
Sridhar Iyer
Access Point
Distribution System
STA2
Distribution System
802.11 LAN
STA3
IIT Bombay
100
Source: Schiller
application
TCP
TCP
IP
IP
LLC
LLC
LLC
802.11 MAC
802.11 MAC
802.3 MAC
802.3 MAC
802.11 PHY
802.11 PHY
802.3 PHY
802.3 PHY
Sridhar Iyer
IIT Bombay
101
Access methods
DCF CSMA/CA (mandatory)
collision avoidance via randomized back-off mechanism
ACK packet for acknowledgements (not for broadcasts)
DCF w/ RTS/CTS (optional)
avoids hidden terminal problem
PCF (optional)
access point polls terminals according to a list
Sridhar Iyer
IIT Bombay
102
802.11 - CSMA/CA
DIFS
DIFS
medium busy
contention window
(randomized back-off
mechanism)
next frame
direct access if
medium is free DIFS
t
slot time
IIT Bombay
103
DIFS
station1
station2
DIFS
boe
bor
boe
busy
DIFS
boe bor
boe
boe busy
boe bor
boe
boe
busy
busy
station3
station4
boe bor
station5
busy
bor
t
busy
Sridhar Iyer
IIT Bombay
104
802.11 RTS/CTS
station can send RTS with reservation parameter after waiting for DIFS
(reservation determines amount of time the data packet needs the
medium)
acknowledgement via CTS after SIFS by receiver (if ready to receive)
sender can now send data at once, acknowledgement via ACK
other stations store medium reservations distributed via RTS and CTS
DIFS
sender
RTS
data
SIFS
receiver
other
stations
Sridhar Iyer
CTS SIFS
SIFS
NAV (RTS)
NAV (CTS)
defer access
IIT Bombay
ACK
DIFS
data
t
contention
105
802.11 - PCF I
t0 t1
medium busy PIFS
point
coordinator
wireless
stations
stations
NAV
Sridhar Iyer
SuperFrame
SIFS
D1
SIFS
SIFS
D2
SIFS
U1
U2
NAV
IIT Bombay
106
802.11 - PCF II
t2
point
coordinator
wireless
stations
stations
NAV
Sridhar Iyer
D3
PIFS
SIFS
D4
t3
t4
CFend
SIFS
U4
NAV
contention free period
IIT Bombay
contention
period
107
Sridhar Iyer
IIT Bombay
108
Power management
sleep-mode without missing a message
periodic sleep, frame buffering, traffic measurements
Association/Reassociation
integration into a LAN
roaming, i.e. change networks by changing access points
scanning, i.e. active search for a network
IIT Bombay
109
IIT Bombay
110
802.11 variants
LLC
802.11i
security
WEP
802.11f
Inter Access Point Protocol
MAC
802.11e
QoS enhancements
MIB
PHY
DSSS
FH
802.11b
5,11 Mbps
802.11g
20+ Mbps
Sridhar Iyer
MAC
Mgmt
IIT Bombay
IR
OFDM
802.11a
6,9,12,18,24
36,48,54 Mbps
111
Industry
Verticals
Campus
Networking
Enterprise
Public hotspots
Mobile Operators
Broadband access
to home
Revenue generation
opportunity;
low cost alternative
to GPRS
Untested
proposition;
attempts are ongoing
Warehouses
Factory floors
Medical
Remote data
entry;
business
process
efficiency
improvement
Sridhar Iyer
Mobile user
population
without any
office space
Freedom from
wires for laptop
users;
productivity
enhancement
IIT Bombay
112
Public WLANs
Provide significantly higher data rates than widearea wireless networks
Could take advantages of both WLAN and widearea radio technologies to create new services
and reduce networking costs
Public WLANs are the first wave of all-IP radio
access networks
New and innovative business models for
providing public mobile services
Sridhar Iyer
IIT Bombay
113
Sridhar Iyer
IIT Bombay
114
Sridhar Iyer
IIT Bombay
116
IEEE 802.16
WirelessMAN air interface
for fixed point to multi-point BWA
Sridhar Iyer
IIT Bombay
117
802.16 Architecture
Sridhar Iyer
IIT Bombay
118
Channel model
Two Channels: Downlink and Uplink
Supports both Time Division Duplexing and
Frequency Division Duplexing
Base station maps downstream traffic onto time
slots with individual subscriber stations allocated
time slot serially
Uplink is shared between a number of subscriber
stations by Time Division Multiple Access
Sridhar Iyer
IIT Bombay
119
Network initialization of SS
Sridhar Iyer
IIT Bombay
120
Sridhar Iyer
IIT Bombay
121
Best effort
Offers no guarantee.
Sridhar Iyer
IIT Bombay
122
802.16: Summary
Higher throughput at longer ranges (up to 50 km)
Better bits/second/Hz at longer ranges
Scalable system capacity
Easy addition of channels maximizes cell capacity
Flexible channel bandwidths accommodate allocations for both
licensed and license-exempt spectrums
Coverage
Standards-based mesh and smart antenna support
Adaptive modulation enables tradeoff of bandwidth for range
Quality of Service
Grant / request MAC supports voice and video
Differentiated service levels: E1/T1 for business, best effort for
residential
Sridhar Iyer
IIT Bombay
123
802.16a/REVd
802.16e
Completed
Dec 2001
Estimate 2006
Spectrum
10 - 66 GHz
< 11 GHz
< 6 GHz
Channel Conditions
Bit Rate
Up to 75 Mbps at 20MHz
channelization
Up to 15 Mbps at 5MHz
channelization
Modulation
Same as 802.16a
Mobility
Fixed
Fixed
Pedestrian mobility
regional roaming
Channel
Bandwidths
1-3 miles
1-3 miles
Sridhar Iyer
IIT Bombay
124
802.11 Internals
IIT Bombay
126
Wireless Media
Physical layers used in wireless networks
have neither absolute nor readily observable boundaries
outside which stations are unable to receive frames
are unprotected from outside signals
communicate over a medium significantly less reliable
than the cable of a wired network
have dynamic topologies
lack full connectivity and therefore the assumption
normally made that every station can hear every other
station in a LAN is invalid (i.e., STAs may be hidden
from each other)
have time varying and asymmetric propagation properties
Sridhar Iyer
IIT Bombay
127
wired network
AP
ad-hoc network
Sridhar Iyer
IIT Bombay
128
Source: Schiller
IEEE 802.11
Wireless LAN standard defined in the unlicensed spectrum (2.4
GHz and 5 GHz U-NII bands)
12cm
33cm
26 MHz
902 MHz
83.5 MHz
2.4 GHz
928 MHz
5cm
200 MHz
5.15 GHz
2.4835 GHz
5.35 GHz
IIT Bombay
129
application
TCP
TCP
IP
IP
LLC
LLC
LLC
802.11 MAC
802.11 MAC
802.3 MAC
802.3 MAC
802.11 PHY
802.11 PHY
802.3 PHY
802.3 PHY
Sridhar Iyer
IIT Bombay
130
Functional Diagram
Sridhar Iyer
IIT Bombay
131
Sridhar Iyer
LLC
MAC
MAC Management
PLCP
PHY Management
PMD
IIT Bombay
Station Management
PHY
DLC
MAC
access mechanisms,
fragmentation, encryption
MAC Management
synchronization, roaming,
MIB, power management
132
802.11 LAN
STA1
802.x LAN
BSS1
Portal
Access
Point
Access
Point
ESS
Portal
bridge to other (wired) networks
BSS2
Sridhar Iyer
Access Point
Distribution System
STA2
Distribution System
802.11 LAN
STA3
IIT Bombay
133
Source: Schiller
IIT Bombay
134
Sridhar Iyer
IIT Bombay
135
Source: Intersil
IIT Bombay
136
Spread-spectrum communications
Sridhar Iyer
IIT Bombay
137
Source: Intersil
Sridhar Iyer
IIT Bombay
138
Source: Intersil
DSSS properties
Sridhar Iyer
IIT Bombay
139
Source: Intersil
Access methods
DCF CSMA/CA (mandatory)
collision avoidance via randomized back-off mechanism
ACK packet for acknowledgements (not for broadcasts)
DCF w/ RTS/CTS (optional)
avoids hidden/exposed terminal problem, provides
reliability
PCF (optional)
access point polls terminals according to a list
Sridhar Iyer
IIT Bombay
140
802.11 - CSMA/CA
DIFS
DIFS
medium busy
contention window
(randomized back-off
mechanism)
next frame
direct access if
medium is free DIFS
t
slot time
station which has data to send starts sensing the medium (Carrier
Sense based on CCA, Clear Channel Assessment)
if the medium is free for the duration of an Inter-Frame Space
(IFS), the station can start sending (IFS depends on service type)
if the medium is busy, the station has to wait for a free IFS plus an
additional random back-off time (multiple of slot-time)
if another station occupies the medium during the back-off time of
the station, the back-off timer stops (fairness)
Sridhar Iyer
IIT Bombay
141
DIFS
sender
data
SIFS
receiver
ACK
DIFS
other
stations
Sridhar Iyer
waiting time
IIT Bombay
data
t
contention
142
802.11 RTS/CTS
If medium is free for DIFS, station can send RTS with reservation
parameter (reservation determines amount of time the data packet needs
the medium)
acknowledgement via CTS after SIFS by receiver (if ready to receive)
sender can now send data at once, acknowledgement via ACK
other stations store medium reservations distributed via RTS and CTS
DIFS
sender
RTS
data
SIFS
receiver
other
stations
Sridhar Iyer
CTS SIFS
SIFS
NAV (RTS)
NAV (CTS)
defer access
IIT Bombay
ACK
DIFS
data
t
contention
143
IIT Bombay
144
IIT Bombay
145
Example - backoff
B1 = 25
B1 = 5
wait
data
data
B2 = 20
cw = 31
Sridhar Iyer
wait
B2 = 15
B2 = 10
IIT Bombay
146
DIFS
station1
station2
DIFS
boe
bor
boe
busy
boe bor
boe
boe busy
boe bor
boe
boe
busy
busy
station3
station4
boe bor
station5
busy
bor
t
busy
Sridhar Iyer
DIFS
IIT Bombay
147
Source: Schiller
802.11 - Priorities
defined through different inter frame spaces mandatory idle
time intervals between the transmission of frames
SIFS (Short Inter Frame Spacing)
highest priority, for ACK, CTS, polling response
SIFSTime and SlotTime are fixed per PHY layer (10 s and 20
s respectively in DSSS)
IIT Bombay
148
RTS
RTS
D
CTS
CTS
DATA
Sridhar Iyer
IIT Bombay
149
802.11 - Reliability
Use acknowledgements
When B receives DATA from A, B sends an ACK
If A fails to receive an ACK, A retransmits the DATA
Both C and D remain quiet until ACK (to prevent collision of
ACK)
Expected duration of transmission+ACK is included in
RTS/CTS packets
RTS
RTS
D
CTS
CTS
DATA
ACK
Sridhar Iyer
IIT Bombay
150
IIT Bombay
151
Fragmentation
DIFS
sender
frag1
RTS
SIFS
receiver
CTS SIFS
frag2
SIFS
ACK1 SIFS
NAV (RTS)
NAV (CTS)
other
stations
Sridhar Iyer
SIFS
NAV (frag1)
NAV (ACK1)
ACK2
DIFS
data
t
contention
IIT Bombay
152
Power management
sleep-mode without missing a message
periodic sleep, frame buffering, traffic measurements
Association/Reassociation
integration into a LAN
roaming, i.e. change networks by changing access points
scanning, i.e. active search for a network
IIT Bombay
153
802.11 - Synchronization
All STAs within a BSS are synchronized to a common
clock
Infrastructure mode: AP is the timing master
periodically transmits Beacon frames containing Timing
Synchronization function (TSF)
Receiving stations accepts the timestamp value in TSF
Ad hoc mode: TSF implements a distributed algorithm
Each station adopts the timing received from any beacon
that has TSF value later than its own TSF timer
IIT Bombay
154
beacon interval
access
point
medium
B
busy
busy
B
busy
B
busy
t
Sridhar Iyer
IIT Bombay
beacon frame
155
Source: Schiller
station1
B1
B1
B2
station2
medium
busy
busy
Sridhar Iyer
B2
busy
B
busy
beacon frame
IIT Bombay
t
random delay
156
Infrastructure
Traffic Indication Map (TIM)
list of unicast receivers transmitted by AP
Delivery Traffic Indication Map (DTIM)
list of broadcast/multicast receivers transmitted by AP
Ad-hoc
Ad-hoc Traffic Indication Map (ATIM)
announcement of receivers by stations buffering frames
more complicated - no central AP
collision of ATIMs possible (scalability?)
Sridhar Iyer
IIT Bombay
157
IIT Bombay
158
access
point
DTIM interval
D B
T
busy
medium
busy
D B
busy
busy
p
station
d
t
Sridhar Iyer
TIM
broadcast/multicast
DTIM
awake
p PS poll
IIT Bombay
d data transmission
to/from the station
159
Source: Schiller
station1
B1
station2
beacon frame
awake
Sridhar Iyer
beacon interval
B2
random delay
a acknowledge ATIM
IIT Bombay
B2
B1
A transmit ATIM
t
D transmit data
d acknowledge data
160
Sequence numbers
important against duplicated frames due to lost ACKs
Addresses
receiver, transmitter (physical), BSS identifier, sender (logical)
Miscellaneous
sending time, checksum, frame control, data
bytes
2
Frame
Control
2
6
6
6
2
6
Duration Address Address Address Sequence Address
ID
1
2
3
Control
4
0-2312
Data
CRC
Sridhar Iyer
IIT Bombay
161
frame
address address address
duration
control
1
2
3
seq address
4
control
0 - 2312
payload
CRC
Sridhar Iyer
IIT Bombay
162
R1 router
H1
Internet
AP
source address
802.3 frame
AP MAC addr H1 MAC addr R1 MAC addr
address 1
address 2
address 3
802.11 frame
Sridhar Iyer
IIT Bombay
163
duration of reserved
transmission time (RTS/CTS)
2
frame
address address address
duration
control
1
2
3
2
Protocol
version
Type
Subtype
To
AP
seq address
4
control
From More
AP
frag
1
Retry
0 - 2312
payload
CRC
Power More
mgt
data
WEP
Rsvd
frame type
(RTS, CTS, ACK, data)
Sridhar Iyer
IIT Bombay
164
Types of Frames
Control Frames
RTS/CTS/ACK
CF-Poll/CF-End
Management Frames
Beacons
Probe Request/Response
Association Request/Response
Dissociation/Reassociation
Authentication/Deauthentication
ATIM
Data Frames
Sridhar Iyer
IIT Bombay
165
802.11 - Roaming
Bad connection in Infrastructure mode? Perform:
scanning of environment
listen into the medium for beacon signals or send probes into the
medium and wait for an answer
IIT Bombay
166
router
hub or
switch
self-learning
switch will see frame from H1
and remember which switch
port can be used to reach H1
BBS 1
AP 1
AP 2
H1
Sridhar Iyer
IIT Bombay
BBS 2
167
Sridhar Iyer
IIT Bombay
168
IIT Bombay
169
Sridhar Iyer
IIT Bombay
170
802.11 - PCF I
t0 t1
medium busy PIFS
point
coordinator
wireless
stations
stations
NAV
Sridhar Iyer
SuperFrame
SIFS
D1
SIFS
SIFS
D2
SIFS
U1
U2
NAV
IIT Bombay
171
Source: Schiller
802.11 - PCF II
t2
point
coordinator
wireless
stations
stations
NAV
Sridhar Iyer
D3
PIFS
SIFS
D4
t3
t4
CFend
SIFS
U4
NAV
contention free period
IIT Bombay
contention
period
172
IIT Bombay
173
Sridhar Iyer
IIT Bombay
174
ICCC
2002
Data rate
1, 2, 5.5, 11 Mbit/s, depending
on SNR
User data rate max. approx. 6
Mbit/s
Transmission range
300m outdoor, 30m indoor
Max. data rate ~10m indoor
Frequency
Connectionless/always on
Quality of Service
Typ. Best effort, no guarantees
(unless polling is used, limited
support in products)
Manageability
Limited (no automated key
distribution, sym. Encryption)
Special
Security
Limited, WEP insecure, SSID
Cost
100$ adapter, 250$ base
station, dropping
Availability
Many products, many vendors
Sridhar Iyer
IIT Bombay
16
synchronization
SFD
16
16
PLCP preamble
bits
variable
payload
PLCP header
1, 2, 5.5 or 11 Mbit/s
16
SFD
16
PLCP preamble
(1 Mbit/s, DBPSK)
variable
bits
payload
PLCP header
(2 Mbit/s, DQPSK)
96 s
Sridhar Iyer
16
2, 5.5 or 11 Mbit/s
IIT Bombay
176
2400
2412
channel 7
channel 13
2442
2472
22 MHz
2483.5
[MHz]
US (FCC)/Canada (IC)
channel 1
2400
2412
channel 6
channel 11
2437
2462
22 MHz
Sridhar Iyer
IIT Bombay
2483.5
[MHz]
177
Data rate
6, 9, 12, 18, 24, 36, 48, 54 Mbit/s, depending
on SNR
User throughput (1500 byte packets): 5.3 (6),
18 (24), 24 (36), 32 (54)
6, 12, 24 Mbit/s mandatory
Connectionless/always on
Security
Limited, WEP insecure, SSID
Availability
Some products, some vendors
Sridhar Iyer
Special
Advantages/Disadvantages
Advantage: fits into 802.x
standards, free ISM-band,
available, simple system, uses
less crowded 5 GHz band
Disadvantage: stronger shading
due to higher frequency, no QoS
Cost
280$ adapter, 500$ base station
Manageability
Limited (no automated key
distribution, sym. Encryption)
Frequency
Free 5.15-5.25, 5.25-5.35, 5.725-5.825 GHz
ISM-band
Quality of Service
Typ. best effort, no guarantees
(same as all 802.11 products)
Transmission range
E.g., 54 Mbit/s up to 5 m, 48 up to 12 m, 36 up
to 25 m, 24 up to 30m, 18 up to 40 m, 12 up to
60 m
IIT Bombay
178
12
16
tail service
variable
variable
payload
tail
pad
bits
PLCP header
PLCP preamble
12
signal
1
6 Mbit/s
Sridhar Iyer
data
variable
symbols
IIT Bombay
179
-26 -21
-7 -1 1
Sridhar Iyer
IIT Bombay
21 26
subcarrier
number
180
5150
40
44
48
52
56
60
64
channel
5350 [MHz]
16.6 MHz
149
153
157
161
channel
center frequency =
5000 + 5*channel number [MHz]
Sridhar Iyer
IIT Bombay
181
EDCF
Contention Window based prioritization
Real-time
Best effort
Sridhar Iyer
IIT Bombay
182
Access
to
channe
l
Prioritised VoIP calls : smaller
contention window
Sridhar Iyer
IIT Bombay
183
IIT Bombay
184
Mobile IP
Sridhar Iyer
IIT Bombay
185
Traditional Routing
A routing protocol sets up a routing table in routers
Sridhar Iyer
IIT Bombay
186
Sridhar Iyer
IIT Bombay
187
Changing of IP address
DNS updates take to long time
TCP connections break
security problems
Solution requirements
retain same IP address, use same layer 2 protocols
authentication of registration
messages,
Sridhar Iyer
IIT Bombay
188
MN
Router
3
Home
agent
Router
1
Sridhar Iyer
Router
2
IIT Bombay
189
MN
Foreign agent
Home agent
Router
1
Sridhar Iyer
Router
2
IIT Bombay
190
IIT Bombay
191
MN
home network
receiver
Internet
FA
CN
sender
Sridhar Iyer
foreign
network
192
Source: Schiller
home network
MN
sender
Internet
FA
foreign
network
CN
receiver
Sridhar Iyer
IIT Bombay
193
Source: Schiller
MN Registration
MN signals COA to the HA via the FA
HA acknowledges via FA to MN
limited lifetime, need to be secured by authentication
HA Proxy
HA advertises the IP address of the MN (as for fixed systems)
packets to the MN are sent to the HA
independent of changes in COA/FA
Packet Tunneling
Sridhar Iyer
HA to MN via FA
IIT Bombay
194
Optimizations
Triangular Routing
HA informs sender the current location of MN
Change of FA
new FA informs old FA to avoid packet loss, old FA now
forwards remaining packets to new FA
Sridhar Iyer
IIT Bombay
195
Sridhar Iyer
IIT Bombay
196
Multi-Hop Wireless
May need to traverse multiple links to reach destination
Sridhar Iyer
IIT Bombay
197
IIT Bombay
198
802.11 DCF:
Uses RTS-CTS to avoid hidden terminal problem
Uses ACK to achieve reliability
IIT Bombay
199
A starts sending to B.
C senses carrier, finds medium in use and has to
wait for A->B to end.
D is outside the range of A, therefore waiting is not
necessary.
A and C are exposed terminals
Sridhar Iyer
IIT Bombay
200
Sridhar Iyer
IIT Bombay
201
Sridhar Iyer
IIT Bombay
202
Sridhar Iyer
IIT Bombay
203
Reactive protocols
Determine route if and when needed
Source initiates route discovery
Example: DSR (dynamic source routing)
Hybrid protocols
Adaptive; Combination of proactive and reactive
Example : ZRP (zone routing protocol)
Sridhar Iyer
IIT Bombay
204
IIT Bombay
205
E
F
G
H
K
I
D
N
IIT Bombay
206
Broadcast transmission
[S]
S
Z
E
F
G
H
K
I
D
N
207
[S,E]
F
[S,C]
K
I
D
N
IIT Bombay
208
[S,E,F,J,M]
G
H
IIT Bombay
209
RREP [S,E,F,J,D]
G
H
K
I
D
N
IIT Bombay
210
E
F
G
H
K
I
D
N
IIT Bombay
211
Sridhar Iyer
IIT Bombay
212
DSDV
Each node advertises a monotonically
increasing even sequence number for itself
When a node decides that a route is broken, it
increments the sequence number of the route
and advertises it with infinite metric
Destination advertises new sequence number
Sridhar Iyer
IIT Bombay
213
DSDV example
When X receives information from Y about a route to Z
Let destination sequence number for Z at X be S(X), S(Y) is
sent from Y
X
Sridhar Iyer
IIT Bombay
214
Protocol Trade-offs
Proactive protocols
Reactive protocols
Sridhar Iyer
IIT Bombay
215
Sridhar Iyer
IIT Bombay
216
IIT Bombay
217
BS
Base Station
IIT Bombay
MH
Mobile Host
218
TCP connection
application
application
transport
transport
transport
network
network
network
link
link
link
physical
physical
physical
Sridhar Iyer
IIT Bombay
rxmt
wireless
application
219
Snoop protocol
Buffers data packets at the base station BS
to allow link layer retransmission
BS
IIT Bombay
MH
220
Snoop protocol
Per TCP-connection state
TCP connection
application
application
application
transport
transport
transport
network
network
link
link
link
physical
physical
physical
FH
Sridhar Iyer
BS
IIT Bombay
rxmt
wireless
network
MH
221
Impact of handoffs
Split connection approach
hard state at base station must be moved to new base station
Snoop protocol
soft state need not be moved
while the new base station builds new state, packet losses may
not be recovered locally
Sridhar Iyer
IIT Bombay
222
M-TCP
Similar to the split connection approach, M-TCP
splits one TCP connection into two logical parts
the two parts have independent flow control as in ITCP
Ack 1000
BS
IIT Bombay
MH
223
M-TCP
When a new ack is received with receivers
advertised window = 0, the sender enters
persist mode
Sender does not send any data in persist mode
except when persist timer goes off
IIT Bombay
224
TCP in MANET
Several factors affect TCP performance in MANET:
Wireless transmission errors
may cause fast retransmit, which results in
retransmission of lost packet
reduction in congestion window
reducing congestion window in response to errors is
unnecessary
IIT Bombay
225
IIT Bombay
226
Route is
repaired
No
throughput
No throughput
despite route repair
Sridhar Iyer
227
Network management
Five key areas (FCAPS):
Fault management
Capacity management
Accounting(access) management
Performance management
Security management
IIT Bombay
229
Sridhar Iyer
Roaming.
Persistence of Mobile Units.
Lack of SNMP Agents in Mobile Units.
Mobile Adhoc Networks.
IIT Bombay
230
Wireless security
Sridhar Iyer
IIT Bombay
231
Threats
Disclosure of sensitive/confidential data
Denial of service (DoS)
Unauthorized access to wireless-enabled
resources
Potential weakening of existing security
measures on connected wired networks and
systems
Sridhar Iyer
IIT Bombay
232
Vulnerabilities
Wired Equivalent Privacy (WEP) encryption
standard is weak
Radio signals susceptible to jamming and
interference
Protocol vulnerabilities allow
Network sessions to be taken over by an intruder
Injection of invalid data into network traffic
Network reconnaissance
Sridhar Iyer
IIT Bombay
233
Vulnerabilities - 1
Example: The radio
signal from a
wireless network can
spill over from the
building where
access points are
located to
neighboring
buildings, parking
lots and public roads.
Sridhar Iyer
IIT Bombay
234
Vulnerabilities - 2
Example: Many wireless
networks do not use WEP
or other encryption to
protect network traffic.
Sridhar Iyer
IIT Bombay
235
Vulnerabilities - 3
Example: These
packet traces show
highly confidential
data that can be
captured from a
wireless network
Sridhar Iyer
IIT Bombay
236
Can use
higher level
services to
compensate
for lower layers
Tradeoffs in
performance
and security
Middleware
TCP/IP
Wireless
Link
Sridhar Iyer
IIT Bombay
237
IIT Bombay
238
Being secure
Develop wireless network policies
Conduct risk assessments to determine required
level of security
Limit access to wireless networks through the
use of wireless security measures (i.e. 802.11i or
WPA)
Maintain logical separation between wireless
and wired networks
Perform wireless scans to identify wireless
networks and applications (on a regular basis)
Enforce wireless network policies
Sridhar Iyer
IIT Bombay
239
802.16 internals
Data
802.1 Bridging
Link
Layer
802.3
802.4
802.5
802.6
802.11
802.12
802.16
Medium
Medium
Medium
Medium
Medium
Medium
Medium
Access
Access
Access
Access
Access
Access
Access
802.3
802.4
802.5
802.6
802.11
802.12
802.16
Physical
Physical
Physical
Physical
Physical
Physical
Physical
Physical
Layer
Sridhar Iyer
IIT Bombay
241
IEEE 802.16
Purpose:
to enable rapid worldwide deployment of cost-effective
broadband wireless access products
802.16:
consists of the BS (Base Station) and SSs(Subscriber Stations)
All data traffic goes through the BS, and the BS can control the
allocation of bandwidth on the radio channel.
802.16 is a Bandwidth on Demand system.
Standard specifies:
The air interface, MAC (Medium Access Control), PHY(Physical
layer)
Sridhar Iyer
IIT Bombay
242
IEEE 802.16
The spectrum to be used
10 - 66 GHz licensed band
Due to the short wavelength
Sridhar Iyer
IIT Bombay
243
Admission control :
Ensures that resources to support QoS requirements of
a new flow are available
Link initialization:
Scans for a channel, synchronizes the SS with the BS,
performs registration, and various security issues.
IIT Bombay
244
Basic services
UGS(Unsolicited Grant Service)
Supports real-time service flows that generate fixed size data
packets on a periodic basis, such as T1/E1 and Voice over IP
The BS shall provide fixed size slot at periodic intervals.
IIT Bombay
245
UL-MAP(Uplink Map)
UL-MAP message allocates access to the uplink channel
Uplink
Random access area is primarily used for the initial
access but also for the signalling when the terminal
has no resources allocated within the uplink phase.
Sridhar Iyer
IIT Bombay
246
Movable boundary
Downlink
Carrier
Broadcast Phase
Downlink Phase
Broadcast
Reserved
Movable boundary
Uplink
Carrier
Uplink Phase
Reserved
Sridhar Iyer
IIT Bombay
Contention
247
Frame n
DL-MAP n-1
UL-MAP n-1
Downlink
Subframe
Uplink
Subframe
Round trip delay + T_proc
Sridhar Iyer
IIT Bombay
248
Downlink Scheduling
Radio resources have to be scheduled
according to the QoS(Quality of Service)
parameters
Downlink scheduling:
the flows are simply multiplexed
the standard scheduling algorithms can be used
WRR(Weighted Round Robin)
VT(Virtual Time)
WFQ(Weighted Fair Queueing)
WFFQ(Worst-case Fair weighted Fair Queueing)
DRR(Deficit Round Robin)
DDRR(Distributed Deficit Round Robin)
Sridhar Iyer
IIT Bombay
249
WRR
1 1 1
VCC 2 (Source 2)
2 2
2
1
3
VCC 3 (Source 3)
Sridhar Iyer
3 3 3 3 3
Counter
Reset
Cycle
3 3 1 3 2 1 3 3 1 3 2 1
WRR
scheduler
IIT Bombay
250
VT
VT : aims to emulate the TDM(Time Division Multiplexing) system
connection 1 : reserves 50% of the link bandwidth
connection 2, 3 : reserves 20% of the link bandwidth
Connection 1
Average inter-arrival : 2 units
Connection 2
Average inter-arrival : 5 units
Connection 3
Average inter-arrival : 5 units
First-Come-First-Served
service order
Virtual times
Virtual Clock service order
Sridhar Iyer
IIT Bombay
251
Uplink Scheduling
Uplink scheduling:
Responsible for the efficient and fair allocation of the
resources(time slots) in the uplink direction
Uplink carrier :
Reserved slots
contention slots(random access slots)
The standard scheduling algorithms can be used
Sridhar Iyer
IIT Bombay
252
IIT Bombay
253
rtPS
The BS provides periodic unicast request opportunities.
The SS is prohibited from using any contention opportunities.
nrtPS
The BS provides timely unicast request opportunities.
The SS is allowed to use contention request opportunities.
BE
The SS is allowed to use contention request opportunities.
Sridhar Iyer
IIT Bombay
254
2.1
5.1
BS
1
4
2.2
5.2
Sridhar Iyer
SS1
SS2
4.
1. BS
BS allocates
allocates bandwidth
bandwidth to
to SSs
SSs
for
based on
for transmitting
transmitting data
bandwidth
their
bandwidth requests.
request.
is also
allocated for
2.1Bandwidth
SS1 transmits
bandwidth
requesting
requests. more bandwidth.
5.1
and
2.2 SS
SS12 transmits
transmits data
bandwidth
bandwidth
requests. requests.
5.2 SS2 transmits data and
bandwidth requests.
IIT Bombay
255
Example
Total Uplink Bytes =
100
2 SS and 1 BS
SS1
Demands:
SS2
Demands:
UGS = 20
UGS = 10
rtPS = 12
rtPS = 10
nrtPS = 15
nrtPS = 15
BE = 30
BE = 20
Flows:
UGS
1st Round 40
30
Excess Bytes = 18
2nd Round 30
30
Excess Bytes = 2
3rd Round
30
30
rtPS
30
22
nrtPS
20
20
BE
10
10
22
22
20+12 10+6
32
16
22
22
30
30
16+2
18
256
Sridhar Iyer
IIT Bombay
257
Sridhar Iyer
IIT Bombay
258
9.6
14.4
28
64
144
384
2000
Transaction Processing
Messaging/Text Apps
Voice/SMS
Location Services
Still Image Transfers
Internet/VPN Access
Database Access
Document Transfer
Low Quality Video
High Quality Video
Sridhar Iyer
IIT Bombay
259
Bandwidth
Requirements
High
Streaming
Video
Video
Conferencing
E-mail with
Attachments
Text
email
Internet/
intranet
E-commerce
Voice
ERP
Terminal Mode
Low
Low
Sridhar Iyer
Latency Sensitivity
IIT Bombay
High
260
Quality of Service
Network-level QoS
Metrics include available b/w, packet loss rates, etc
Elements of a Network QoS Architecture
QoS specification (traffic classes)
Resource management and admission control
Service verification and traffic policing
Packet forwarding mechanisms (filters, shapers, schedulers)
QoS routing
Application-level QoS
How well user expectations are qualitatively satisfied
Clear voice, jitter-free video, etc
Implemented at application-level:
end-to-end protocols (RTP/RTCP)
application-specific encodings (FEC)
Sridhar Iyer
IIT Bombay
261
IIT Bombay
262
or
Router
Workstation
Router
Internetwork or WAN
Router
Workstation
Data Plane:
Traffic conditioning (shaping, policing, marking etc) at the edge +
Traffic Classification + Claiming Reserved Resources (Per-hop Behavior- PHB),
scheduling, buffer management
Sridhar Iyer
IIT Bombay
263
Services: Queuing/Scheduling
Traffic
Sources
$$$$$$
Traffic
Classes
$$$
Class A
Class B
Class C
IIT Bombay
264
Users perspective
Fairness and Stability
Transparency and Predictability
Controllability
Sridhar Iyer
IIT Bombay
265
Multimedia applications
Audio
Speech (CELP type codecs)
Music (MP3, WAV, WMA, Real)
Video (MPEG 1, 2, 4)
Streaming
using HTTP/TCP (MP3)
using RTP/UDP (Video)
Sridhar Iyer
IIT Bombay
266
Quality of Service
Media Transport
H.323
SDP
Reservation
Measurement
RSVP
RTCP
RTSP
SIP
H.261, MPEG
RTP
TCP
Application daemon
MGCP/Megaco
UDP
network
IPv4, IPv6
kernel
link
PPP
physical
Sonet
Sridhar Iyer
AAL3/4
AAL5
PPP
ATM
Ethernet
IIT Bombay
V.34
267
Modify/Terminate sessions
Session Description Protocol (SDP)
Used to specify client capabilities
Example (client can support MPEG-1 video codec,
and MP3 codecs)
Sridhar Iyer
IIT Bombay
268
SIP components
User Agent Client (UAC)
End systems; Send SIP requests
Redirect Server
Redirects users to try other server
Proxy Server
Sridhar Iyer
IIT Bombay
269
SIP architecture
Request
Response
SIP Redirect
Server
Media
Location Service
2
3
5
4
6
11
12
SIP Proxy
13
SIP Client
10
SIP Proxy
8
14
SIP Client
(User Agent Server)
Sridhar Iyer
IIT Bombay
270
PROXY
PROXY
USER B
INVITE
407 Proxy Authenticate
ACK
INVITE
100 Trying
180 Ringing
200 OK
ACK
INVITE
100 Trying
180 Ringing
200 OK
ACK
INVITE
180 Ringing
200 OK
ACK
Sridhar Iyer
BYE
200 OK
IIT Bombay
BYE
200 OK
271
H.323
H.323 is an ITU standard for multimedia
communications over best-effort LANs.
Part of larger set of standards (H.32X) for
videoconferencing over data networks.
H.323 addresses call control, multimedia
management, and bandwidth management as
well as interfaces between LANs and other
networks.
Sridhar Iyer
IIT Bombay
272
H.323 architecture
Sridhar Iyer
IIT Bombay
273
H.323 components
Terminals:
All terminals must support voice; video and data are optional
Gatekeeper:
most important component which provides call control services
Gateway:
an optional element which provides translation functions
between H.323 conferencing endpoints (esp for ISDN, PSTN)
Sridhar Iyer
IIT Bombay
274
H.323 Gatekeeper
Address translation
H.323 Alias to transport (IP) address
Admission control
Permission to complete call
Can apply bandwidth limits
Method to control LAN traffic
Call signaling/management/reporting/logging
Management of Gateway
H.320, H.324, POTS, etc.
Sridhar Iyer
IIT Bombay
275
H.323 example
1. A sends request to GateKeeper: Can I call B?
2. GK resolves Bob to IP address through H.323
registration or external name service
3. GK applies Admission Policy
4. GK replies to A with Bs IP address
5. A sends Setup message to B
6. B checks with GK for authorizing the connection
7. GK acknowledges B to accept call
8. B replies to A and alerts User
9. H.245 connection established
Sridhar Iyer
IIT Bombay
276
Sridhar Iyer
IIT Bombay
277
RTP (contd)
RTP services
payload type identification
sequence numbering, timestamping
delivery monitoring, optional mixing/translation.
Sridhar Iyer
IIT Bombay
278
Trends
Sridhar Iyer
IIT Bombay
279
3G Network Architecture
Core Network
Wireless
Access Network
Mobile Access
Router
Programmable
Softswitch
IP
Base Stations
Gateway
Application
Server
IP Intranet
Access
Point
Telephone
Network
IP Intranet
(HLR)
User Profiles &
Authentication
802.11
802.11
3G Air
Interface
Sridhar Iyer
Internet
IIT Bombay
Access
Point
Wired Access
280
campus-based
horizontal
handover
in-house
Sridhar Iyer
IIT Bombay
281
Ad-hoc technologies
spontaneous communication, power saving, redundancy
Sridhar Iyer
IIT Bombay
282
References
A.S. Tanenbaum. Computer Networks. Pearson Education, 2003.
J. Schiller, Mobile Communications, Addison Wesley, 2002.
Y-B. Lin and I Chlamtac, Wireless and Mobile Network Architectures,
Wiley, 2001.
802.11 Wireless LAN, IEEE standards, www.ieee.org
Various RFCs: RFC 2002, 2501, 3150, 3449, www.ietf.org
Others websites:
www.palowireless.com
Sridhar Iyer
IIT Bombay
283
Thank You
IIT Bombay
284
Sridhar Iyer
IIT Bombay
285
Sridhar Iyer
IIT Bombay
286
Sridhar Iyer
IIT Bombay
287
Sridhar Iyer
IIT Bombay
288
Sridhar Iyer
IIT Bombay
289
Sridhar Iyer
IIT Bombay
290
Sridhar Iyer
IIT Bombay
291
Sridhar Iyer
IIT Bombay
292
Sridhar Iyer
IIT Bombay
293
Sridhar Iyer
IIT Bombay
294
Sridhar Iyer
IIT Bombay
295
Sridhar Iyer
IIT Bombay
296
Sridhar Iyer
IIT Bombay
297
Sridhar Iyer
IIT Bombay
298