Medium Access Control (MAC) (forts.) Foreleser: Kjell Åge Bringsrud E-mail: kjellb 2/28/2003 1 Persistent og ikkepersistent CSMA Sammenlikning av kanal-utnyttelse versus belastning for noen tilfeldig aksess protokoller. 2/28/2003 2 CSMA med kollisjonsdeteksjon CSMA/CD kan være i én av tre tilstander: “contention”, overføring eller uvirksom. 2/28/2003 3 1 Kollisjonsfrie protokoller Den basale bit-map protokollen 2/28/2003 4 Collision-Free Protocols (2) The binary countdown protocol. A dash indicates silence. 2/28/2003 5 Trådløs Mobiltelefoni Satelitter GPRS UMTS Geostasjonære Lavbane Trådløs “Ethernet” - IEEE 802.11 . . . Bare fantasien (og noen få fysiske lover) setter grenser: Ad-hoc eller spontane nettverk 2/28/2003 6 2 Growth of Wireless and Broadband Internet 2/28/2003 7 Utstyr 2/28/2003 8 Roaming/Mobility Models 2/28/2003 9 3 Explosion of New Internet Appliances 2/28/2003 10 Example: MIT’s “Expressive Footwear” Dance shoes with wireless link & a suite of sensors measure dynamic parameters at a dancer's foot ⌧differential pressure at 3 points and bend in the sole, 2-axis tilt, 3-axis shock, height off the stage, orientation, angular rate and translational position) example use: generate accompanying music 2/28/2003 11 Computing View of the Future Information Systems The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it... the idea of a “personal computer” itself is misplaced... the vision of laptop machines, dynabooks and “knowledge navigators” is only a transitional step... a new way of thinking about computers, one that takes into account the human world and allows the computers themselves to vanish into the background. Mark Weiser (Chief Technologist, Xerox PARC) Scientific American, September1991 2/28/2003 12 4 Alternate Models of Mobile Computing Systems Ubiquitous Information Access information distributed everywhere by the “net” terminal centric ⌧users carry wireless terminals ⌧terminal is the universal service access device ⌧terminal adapts to location and services Ubiquitous Computing cheap computers of different scales and types embedded everywhere ⌧100s of computer in every room in the form of common, day-today objects user centric ⌧computers swapped among users ⌧computers dedicated to service ⌧computers adapt to location and users 2/28/2003 13 Novel Attributes of Mobile and Wireless Systems Wireless ⌧limited bandwidth ⌧high latency – < 3 ms indoor – > 100 ms outdoor (cellular, satellite) ⌧variable link quality – noise, disconnections, interference ⌧link asymmetry ⌧heterogeneous air interfaces ⌧easier snooping More Signal Processing Mobility Portability 2/28/2003 14 Novel Attributes of Mobile and Wireless Systems (2) Wireless Mobility ⌧user and terminal location – are system variables of interest – change dynamically ⌧speed of terminal mobility impacts wireless bandwidth ⌧constants become variable – location, environment, connectivity, b/w, I/O devices, security domain More Protocol Processing ⌧easier spoofing Portability 2/28/2003 15 5 Novel Attributes of Mobile and Wireless Systems (3) Wireless Mobility Portability ⌧limited battery capacity ⌧limited computing ⌧limited storage ⌧small dimensions ⌧risk to data (easily lost) More Energy Efficiency 2/28/2003 16 Heterogeneous Networks Satellite Regional Area Low-tier High-tier Local Area Wide Area Low Mobility High Mobility Seamless mobility across diverse overlay networks ⌧“vertical” hand-offs ⌧software “agents” for heterogeneity management ⌧IP as the common denominator? 2/28/2003 17 Ad Hoc Networks • • • • Disaster recovery Battlefield ‘Smart’ office Etc. Rapidly deployable infrastructure Wireless: cabling impractical Ad-Hoc: no advance planning Backbone network: wireless IP routers 2/28/2003 • Network of access devices • • • Wireless: untethered Ad-hoc: random deployment Edge network: Sensor networks, Personal Area Networks (PANs), etc. 18 6 Location-dependent Information Location affects configuration parameters DNS, timezone, printer etc. Location affects answer to user queries e.g. where is the nearest printer More complex location-dependent queries e.g. where is the nearest taxi Privacy concerns due to location tracking Changing context small movements may cause large changes caching may become ineffective dynamic transfer to nearest server for a service Localization 2/28/2003 19 Portability Power is key long mean-time-to-recharge, small weight, volume Risk to data due to easier privacy breach network integrated terminals with no local storage Small user interfaces small displays, analog inputs (speech, handwriting) instead of buttons and keyboards Small storage capacity data compression, network storage, compressed virtual memory, compact scripts vs. compiled code 2/28/2003 20 Low Power & Energy-awareness Battery technology is a hurdle… no Moore’s Law to help out Typical laptop: 30% display, 30% CPU, 30% rest wireless communication and multimedia processing incur significant power overhead Low power circuits, architectures, protocols Power management Right power at the right place at the right time Battery model 2/28/2003 21 7 Challenges in Mobile and Wireless Computing Portable, energy-efficient devices End-to-end quality of service Seamless operation under context changes Context-aware operation Secure operation Sophisticated services for simple clients 2/28/2003 22 Trådløs “Ethernet” IEEE 802.11 Tre overføringsmetoder Spredt spektrum (to typer) Diffus infrarød Avstand: 5 cm til 5 km Spredt spektrum kan sendes i alle retninger eller konsentreres i en bestemt retning Maksimum tillatt sendestyrke, derfor går bølgene lengst når de er rettet (vi har målt opp til 5 km.) 2/28/2003 23 Spredt spektrum Sprer signalet over et (stort) frekvensområde Signalet er “skjult” i dette området Tåler mye støy (interferens fra annet utstyr) To teknikker: Frekvens hopping: ⌧Sender (og mottaker) hopper rundt i frekvensområdet og sender noen bit hvert sted Direkte sekvens: ⌧hvert bit i rammen representert ved flere bit i det fysiske signalet (fig. 2.37 side 137) 2/28/2003 24 8 Diffus infrarød ( i IEEE 802.11) Millimeter (og kortere) bølger Som lys trenger de ikke gjennom vegger Diffus: Reflekteres av vegger mm. Behøver derfor ikke direkte synslinje 2/28/2003 25 Trådløs Ethernet Ethernet, Men 1: Når både A og C sender til B blir det kollisjon som ingen av dem oppdager A B A og C ser ikke hverandre (skjulte noder) C 2/28/2003 26 Trådløs Ethernet Men 2: Hvis B hører at C sender, må B da ti stille ? Kan B sende (til A) samtidig som C sender (til D) ? A 2/28/2003 B C D 27 9 Collison Avoidance Multiple Access with Collison Avoidance (MA/CA) 1. En avsender spør en mottaker om å få lov å sende en viss stund (sendelengden) 2. Mottaker svarer tilbake til avsenderen: “Klart til å sende” Alle som hører en “Klart til å sende” vet de er nær mottakeren, og må ikke sende selv i dette tidsrommet Alle som bare hørte forespørselen om å sende (men ikke svaret) kan gjerne sende selv 2/28/2003 28 Kollisjon og retransmisjon Når to sendeforespørsler kolliderer vil mottaker ikke skjønne meldingen og gir ikke noe svar Nå det ikke kommer noe svar venter sender en stund før den sender en ny forespørsel (på samme måte som i vanlig Ethernet) Alle datapakker kvitteres (ved ACK-melding) Kommer det ikke noen ACK retransmitteres pakken 2/28/2003 29 Aksesspunkter og celler A, B og C er aksesspunkter M (mobil) sender “Probe”-pakke (til alle) A svarer at den eksisterer med å sende “Probe Response” pakke til M M godtar A som aksesspunkt og svarer til A: “Association Request” A besegler forbindelsen ved å svare “Association Response” til M M Distribusjonsnett A 2/28/2003 B C 30 10 Aksesspunkter og celler Hva skjer nå M flytter seg ? M sender ut nye “Probe” pakker når signalet fra A blir svakt (kalles “active scanning”) Ny forbindelse opprettes så med B M M Distribusjonsnett A B 2/28/2003 C 31 IEEE 802 The LAN/MAN Standards Committee 2/28/2003 32 P802.16 Scope 2/28/2003 33 11 Point-to-Multipoint Wireless MAN: not a LAN 2/28/2003 34 PHY Considerations 2/28/2003 35 Adaptive PHY 2/28/2003 36 12 Definitions • BS – Base Station • SS – Subscriber Station • Downlink (DL) – BS to SS • Uplink (UL) – SS to BS 2/28/2003 37 Adaptive Burst Profiles 2/28/2003 38 Duplex Scheme Support 2/28/2003 39 13 TDD Frame (10-66 GHz) 2/28/2003 40 Burst FDD Framing 2/28/2003 Allows scheduling flexibility 41 Baud Rates & Channel Size (10-66 GHz) 2/28/2003 42 14 MAC Requirements 2/28/2003 43 802.16 MAC: Overview • • • • Point-to-Multipoint Metropolitan Area Network Connection-oriented Supports difficult user environments – High bandwidth, hundreds of users per channel – Continuous and burst traffic – Very efficient use of spectrum • Protocol-Independent core (ATM, IP, Ethernet, …) • Flexible QoS offerings • Supports multiple 802.16 PHYs 2/28/2003 44 MAC PDU Transmission 2/28/2003 45 15 MAC PDU format 2/28/2003 46 Downlink transmissions • Two kinds of bursts: TDM and TDMA • All bursts are identified by a DIUC – Downlink Interval Usage • Each terminal listens to all bursts except when told to transmit • Each burst may contain data for several terminals 2/28/2003 47 Uplink Transmissions • Invited transmissions Invited transmissions • Transmissions in contention slots – Bandwidth requests – Contention resolved using truncated exponential backoff • Transmissions in initial ranging slots – Ranging Requests (RNG-REQ) – Contention resolved using truncated exponential backoff • All transmissions have synchronization preamble • Ideally, all data from a single SS is concatenated into a single PHY burst 2/28/2003 48 16 IP connectivity and configuration file download • IP connectivity established via DHCP • Configuration file downloaded via • contains provisioned information – operational parameters 2/28/2003 49 17