Download Quiz-3 Review - Communications Systems Center

Document related concepts

Multiprotocol Label Switching wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

Internet protocol suite wikipedia , lookup

AppleTalk wikipedia , lookup

Network tap wikipedia , lookup

Wireless security wikipedia , lookup

Computer network wikipedia , lookup

Cellular network wikipedia , lookup

Nonblocking minimal spanning switch wikipedia , lookup

IEEE 802.11 wikipedia , lookup

Airborne Networking wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

IEEE 1355 wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

CAN bus wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Virtual LAN wikipedia , lookup

Transcript
Chapters:
4b-Routing, 5-LAN, 6-Wireless
Review - Quiz-3
Nov. 12, 2015
Some material copyright 1996-2006
J.F Kurose and K.W. Ross, All Rights Reserved
Computer Networking:
A Top Down Approach
Featuring the Internet,
5th edition.
Jim Kurose, Keith Ross
Addison-Wesley
11/10/15
Q3-1
Chapter 4: Network Layer
 4. 1 Introduction
 4.2 Virtual circuit and
datagram networks
 4.3 What’s inside a
router
 4.4 IP: Internet
Protocol




Datagram format
IPv4 addressing
ICMP
IPv6
 4.5 Routing algorithms
 Link state (OSPF)
 Distance Vector (RIP)
 Hierarchical routing (BGP)
 4.6 Routing in the
Internet



RIP
OSPF
BGP
 4.7 Broadcast and
multicast routing
Networ
4-2
k Layer
Distance Vector: link cost changes
Link cost changes:
 good news travels fast
 bad news travels slow -
“count to infinity” problem!
 44 iterations before
algorithm stabilizes: see
text
Poisoned reverse:
 If Z routes through Y to
get to X :

Z tells Y its (Z’s) distance
to X is infinite (so Y won’t
route to X via Z)
 will this completely solve
count to infinity problem?
60
x
4
y
50
1
z
Y advertises X in 4 hops
Z sends datagrams for X to Y
Z advertises "X in 5 hops".
Y-X link cost goes to 60
Y thinks Z can route in 5 hops,
so Y advertises "X in 6", sends
datagrams back to Z.
Z sends datagrams back to Y,
advertises "X in 7".
Y sends datagrams back to Z,
advertises "X in 8".
Q3-3
RIP (Distance-Vector Algorithm)
B
M
128.230.0.0/16
Y
Router A Table
Prefix
Distance Port
128.230.
2
X
130.207.
6
N
209.196.
7
X
24.56.
9
X
A
X
C
Router B Table
Prefix
Distance Port
128.230.
2
X
130.207.
6
X
209.196.
5
M
24.56.
11
X
Z
Router C Table
Prefix
Distance Port
128.230.
2
X
130.207.
4
X
209.196.
7
X
24.56.
11
P
Construct the Routing Table for Router X. Use "L" for the port to the local LAN.
Router X Table
Prefix
Distance Port
128.230.
1
L
130.207.
5
C
209.196.
6
B
24.56.
10
A
Using Poison Reverse, construct the Updates sent from Router X to A, B, and C. (infinity -> 15).
Update X to A Table
Prefix
Distance
128.230.
1
130.207.
5
209.196.
6
24.56.
15
Update X to B Table
Prefix
Distance
128.230.
1
130.207.
5
209.196.
15
24.56.
10
“Poison Reverse” prevents “ping-pong” routes.
Update X to C Table
Prefix
Distance
128.230.
1
130.207.
15
209.196.
6
24.56.
10
Q3-4
Graph abstraction
5
2
u
2
1
Graph: G = (N,E)
v
x
3
w
3
1
5
z
1
y
2
N = set of routers = { u, v, w, x, y, z }
E = set of links ={ (u,v), (u,x), (v,x), (v,w), (x,w), (x,y), (w,y), (w,z), (y,z) }
Remark: Graph abstraction is useful in other network contexts
Example: P2P, where N is set of peers and E is set of TCP connections
Q3-5
Graphical Method
(animated - keep clicking)
5
2 2
5
3
v
w
5
4
3
u
3
2
1
x
2
1
8
1
3
1
5
z
4
y
2
Next Slide
Q3-6
Hierarchical OSPF
Only this router
seen outside Area 1,
where it represents
all the subnets in
Area 1
Q3-7
Hierarchical Routing (BGP)
Our routing study thus far - idealization
 all routers identical
 network “flat”
… not true in practice
scale: with 200 million
destinations:
 can’t store all dest’s in
routing tables!
 routing table exchange
would swamp links!
administrative autonomy
 internet = network of
networks (Autonomous
Systems)
 each network admin may
want to control routing in its
own network
Q3-8
Interconnected ASes
3c
3a
3b
AS3
1a
2a
1c
1d
1b
Intra-AS
Routing
algorithm
2c
AS2
AS1
Inter-AS
Routing
algorithm
Forwarding
table
2b
 Forwarding table is
configured by both
intra- and inter-AS
routing algorithm


Intra-AS sets entries
for internal dests
Inter-AS & Intra-As
sets entries for
external dests
Q3-9
Broadcast Routing
 Deliver packets from source to all other nodes
 Source duplication is inefficient:
duplicate
duplicate
creation/transmission
R1
R1
duplicate
R2
R2
R3
R4
source
duplication
R3
R4
in-network
duplication
 Source duplication: how does source
determine recipient addresses?
Q3-10
In-network duplication
 Flooding: when node receives brdcst pckt,
sends copy to all neighbors

Problems: cycles & broadcast storm
 Controlled flooding: node only brdcsts pkt
if it hasn’t brdcst same packet before
Node keeps track of pckt ids already brdcsted
 Or reverse path forwarding (RPF): only forward
pckt if it arrived on shortest path between
node and source

 Spanning tree
 No redundant packets received by any node
Q3-11
Chapter 5 - Link and Physical Layers
 5.1 Introduction and




services
5.2 Error detection
and correction
5.3Multiple access
protocols
5.4 Link-Layer
Addressing
5.5 Ethernet
 5.6 Hubs and switches
 5.7 PPP
 5.8 Link Virtualization:
ATM and MPLS
Q3-12
Link Layer: Introduction
Some terminology:
“link”
 hosts and routers are nodes
 communication channels that
connect adjacent nodes along
communication path are links



wired links
wireless links
LANs
 layer-2 packet is a frame,
encapsulates datagram
data-link layer has responsibility of
transferring datagram from one node
to adjacent node over a link
Q3-13
Adaptors Communicating
datagram
sending
node
frame
adapter
rcving
node
link layer protocol
physical layer
media and signals
frame
adapter
 link layer implemented in  receiving side
“adaptor” (aka NIC)
 looks for errors, rdt, flow
control, etc
 Ethernet (802.11) card,
 extracts datagram, passes
serial card, WiFi card
to receiving node
 sending side:


encapsulates datagram in
a frame
adds error checking bits,
rdt, flow control, etc.
 adapter is semi-
autonomous
 link & physical layers
Q3-14
Parity Checking - Forward Error Correction (FEC)
Single Bit Parity:
Detect single bit errors
Two Dimensional Bit Parity:
Detect and correct single bit errors
Odd Parity = choose parity
bit so that there is an odd
number of 1's.
1
Even Parity = choose parity
bit so that there is an even
number of 1's.
0
0
Q3-15
Checksumming: Cyclic Redundancy Check
 view data bits, D, as a binary number
 choose r+1 bit pattern (generator), G
 goal: choose r CRC bits, R, such that



<D,R> exactly divisible by G (modulo 2)
receiver knows G, divides <D,R> by G. If non-zero remainder:
error detected!
can detect all burst errors less than r+1 bits
 widely used in practice (ATM, HDLC)
Q3-16
This is for a 3-bit CRC. 3 bits are added to
the data bit stream (D), to be replaced by the
CRC (R) when the data bit stream is sent.
The "Generator Polynomial" (G=1001) must
have 1 more bit than the CRC, and the first
and last bits must be "1".
CRC Example
Want:
D.2r XOR R = nG
equivalently:
D.2r = nG XOR R
equivalently:
if we divide D.2r by G,
want remainder R
R = remainder[
D.2r
G
The "division" uses a
bit-wise XOR logic op
rather than an
arithmetic subtract
operation (no carry).
0
0
0
0
]
Bits sent: 101110 011
Q3-17
MAC Protocols: a taxonomy
Three broad classes:
 Channel Partitioning


divide channel into smaller “pieces” (time slots,
frequency, code)
allocate piece to node for exclusive use
 Random Access
 channel not divided, allow collisions
 “recover” from collisions
 “Taking turns”
 Nodes take turns, but nodes with more to send can take
longer turns
"MAC" – Multiple Access Control protocol
Allows multiple hosts to use (access) the same
communication channel.
Q3-18
Channel Partitioning MAC protocols: TDMA
TDMA: time division multiple access
 access to channel in "rounds"
 each station gets fixed length slot (length = pkt trans time) in each
round
 unused slots go idle
 example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle
 TDM (Time Division Multiplexing): channel divided into N time slots,
one per user; inefficient with low duty cycle users and at light load.
 FDM (Frequency Division Multiplexing): frequency subdivided.
Code Division M. A. – later in Wireless section
Q3-19
Channel Partitioning MAC protocols: FDMA
frequency bands
FDMA: frequency division multiple access
 channel spectrum divided into frequency bands
 each station assigned fixed frequency band
 unused transmission time in frequency bands go idle
 example: 6-station LAN, 1,3,4 have pkt, frequency bands 2,5,6 idle
TDM (Time Division Multiplexing): channel divided into N time slots, one per
user; inefficient with low duty cycle users and at light load.
 FDM (Frequency Division Multiplexing): frequency subdivided.

Q3-20
Slotted ALOHA
Pros
 single active node can
continuously transmit at full
rate of channel
 highly decentralized: only
slots in nodes need to be in
sync
 simple
Cons
 collisions, wasting slots
 idle slots
 nodes may be able to detect
collision in less than time to
transmit packet
 clock synchronization
Maximum Network Efficiency – 37%
Q3-21
Pure (unslotted) ALOHA
 unslotted Aloha: simpler, no synchronization
 when frame first arrives from Network Layer
 transmit immediately
 collision probability increases:
 frame sent at t0 collides with other frames sent in [t0-1,t0+1]
Maximum Network Efficiency – 18%
Q3-22
CSMA/CD (Collision Detection)
CSMA/CD: carrier sensing, deferral as in CSMA
collisions detected within short time
 colliding transmissions aborted, reducing channel
wastage

 collision detection:
 easy in wired LANs: measure signal strengths,
compare transmitted, received signals
 difficult in wireless LANs: receiver shut off while
transmitting
 human analogy: the polite conversationalist
Q3-23
“Taking Turns” MAC protocols
Polling:
 master node
“invites” slave
nodes to transmit in
turn
 concerns:



polling overhead
latency
single point of
failure (master)
Token passing:
 control token passed from
one node to next
sequentially.
 token message
 concerns:



token overhead
latency
single point of failure (token)
Q3-24
MAC Addresses and ARP
 32-bit IP address:


network-layer address
used to get datagram to destination IP subnet
 MAC (or LAN or Physical or Ethernet) address:


used to get frame from one interface to another physically-connected
interface (same network)
48 bit MAC address (for most LANs)
burned in the adapter ROM (can be changed by OS software).
Q3-25
LAN Addresses and ARP
Each adapter on LAN has unique LAN address (written as hex)
1A-2F-BB-76-09-AD
71-65-F7-2B-08-53
LAN
(wired or
wireless)
Broadcast address =
FF-FF-FF-FF-FF-FF
(all 1's)
= adapter
58-23-D7-FA-20-B0
0C-C4-11-6F-E3-98
Q3-26
ARP: Address Resolution Protocol
Question: how to determine
MAC address of B
knowing B’s IP address?
137.196.7.78
 Each IP node (Host, Router)
on LAN has ARP table
 ARP Table: IP/MAC address
mappings for some LAN
nodes
1A-2F-BB-76-09-AD
137.196.7.23
137.196.7.14
LAN
71-65-F7-2B-08-53
137.196.7.88
< IP address; MAC address; TTL>

TTL (Time To Live): time
after which address
mapping will be forgotten
(typically 20 min)
58-23-D7-FA-20-B0
0C-C4-11-6F-E3-98
Q3-27
DHCP: Dynamic Host Configuration Protocol
Goal: allow host to dynamically obtain its IP
address from network server when it joins
network
Can renew its lease on address in use
Allows reuse of addresses (only hold address while
connected an “on”
Support for mobile users who want to join network.
Q3-28
DHCP client-server scenario
DHCP server: 223.1.2.5
Notes:
1. Server listens on
UDP port 67
2. Client listens on
UDP port 68
3. Both use IP
Broadcast
Address for
destination addr.
4. Client uses 0.0.0.0
for source IP
time
addr.
DHCP discover
arriving
client
src : 0.0.0.0, 68
dest.: 255.255.255.255,67
yiaddr: 0.0.0.0
transaction ID: 654
DHCP offer
src: 223.1.2.5, 67
dest: 255.255.255.255, 68
yiaddrr: 223.1.2.4
transaction ID: 654
Lifetime: 3600 secs
DHCP request
src: 0.0.0.0, 68
dest:: 255.255.255.255, 67
yiaddrr: 223.1.2.4
transaction ID: 655
Lifetime: 3600 secs
DHCP ACK
Newer “service discovery” protocols
(e.g., “Bonjour”,"ZeroConf") allow a host to
randomly self-assign a “local link” address
from the reserved range 169.254.0.0/16 to use
while contacting a local “configuration server”
using a mDNS multicast address, 224.0.0.251.
src: 223.1.2.5, 67
dest: 255.255.255.255, 68
yiaddrr: 223.1.2.4
transaction ID: 655
Lifetime: 3600 secs
Q3-29
Ethernet
“dominant” wired LAN technology:
 cheap $20 for 100Mbs!
 first widely used LAN technology
 Simpler, cheaper than token LANs and ATM
 Kept up with speed race: 10 Mbps – 10 Gbps
Metcalfe’s Ethernet
sketch
Q3-30
Star topology
 Bus topology popular through mid 90s
 Now star topology prevails
 Connection choices: hub or switch (more later)
hub or
switch
Q3-31
Ethernet Frame Structure
 Addresses: 6 bytes (3 bytes=vendor, 3=serial no.)
 if adapter receives frame with matching destination
address, or with broadcast address (eg ARP packet), it
passes data in frame to net-layer protocol
 otherwise, adapter discards frame
 Type: 2 bytes - indicates the higher layer protocol
(mostly IP but others may be supported such as
ARP, Novell IPX, and AppleTalk)
 CRC: checked at receiver, if error is detected, the
frame is simply dropped
"Data" includes Network, Transport, and Application headers
and application data (if any).
Q3-32
Unreliable, connectionless service
 Connectionless: No handshaking between sending
and receiving adapter.
 Unreliable: receiving Ethernet adapter doesn’t
send acks or nacks to sending adapter



stream of datagrams passed to network layer can have
gaps
gaps will be filled if app is using TCP
otherwise, app will see the gaps
Q3-33
Ethernet uses CSMA/CD
 No slots (asynchronous)
 Multiple access (MA) to a common
media (coax, hub,…)
 Adapter doesn’t transmit if it
senses that some other adapter is
transmitting, that is, carrier sense
(CS)
 Transmitting adapter aborts when
it senses that another adapter is
transmitting, that is, collision
detection (CD)
 Before attempting a
retransmission, adapter waits
a random time, that is, random
access
 exponential backoff: after
the mth collision, adapter
chooses a K at random from
{0,1,2,…,2m-1}. Adapter waits
K·(512 bit-times) ("time slot"
or "contention time") and tries
again.
 The "time slot" is 51.2 us for
10 Mbps, 5.12 us for 100
Mbps, 512 ns for Gbps.
Q3-34
CSMA/CD efficiency
 Tprop = max prop between 2 nodes in LAN
 ttrans = time to transmit max-size frame
= 96%
 Efficiency goes to 1 as tprop goes to 0
 Goes to 1 as ttrans goes to infinity
( 1us for 200 m)
( 120 us for 1500 bytes
at 100 Mbps)
 Much better than ALOHA, but still decentralized, simple,
and cheap.
Q3-35
10BaseT - 1000BaseT
 10/100/1000 Mbps rate; latter called “Giga Ethernet”
 T stands for Twisted Pair (F stands for Optical Fiber)
 Nodes connect to a Hub: “star topology”; 100 meter (330 ft) max
distance between nodes and Hub
twisted pair
hub
Q3-36
Hubs
Hubs are essentially physical-layer repeaters:
 bits coming from one link go out all other links
 at the same rate
 no frame buffering
 no CSMA/CD at hub: adapters detect collisions
 provides net management functionality
twisted pair
hub
Q3-37
Interconnecting with hubs
 Backbone hub interconnects LAN segments
 Extends max distance between nodes
 But individual segment collision domains become one large collision
domain, since datagrams immediately "repeated" out every port
(except arrival port)
 Can’t interconnect 10BaseT & 100BaseT.
hub
hub
hub
hub
Q3-38
Switch
 Link layer device
stores and forwards Ethernet frames
 examines frame header and selectively
forwards frame based on MAC dest address
 when frame is to be forwarded on segment,
uses CSMA/CD to access segment
 transparent
 hosts are unaware of presence of switches
 plug-and-play, self-learning
 switches do not need to be configured

Today, most small boxes sold as "Hubs" are actually "Switches". This
is definitely true if they work automatically with mixed 10 Mbps and
100 Mbps connections.
Q3-39
Self learning
 A switch has a switch table
 entry in switch table has three fields:
(MAC Address, Interface, Time Stamp)
 stale entries in table dropped (TTL can be 60 min)
 switch learns which hosts can be reached through
which interfaces
 when frame received, switch “learns” location of
sender and incoming LAN segment (physical port)
 records sender/port pair in switch table

Q3-40
Switch example
Suppose C sends frame to D
1
3
2
B
C
hub
hub
hub
A
address interface
switch
I
D
E
F
G
A
B
E
G
1
1
2
3
C
1
H
 Switch receives frame from from C
 notes in switch table that C is on interface 1
 If C were in table, the time stamp (TTL) would be updated.
 because D is not in table, switch forwards frame into interfaces
2 and 3 (Floods).
 frame received by D (and E & F, which ignore it)
Q3-41
Switch: traffic isolation
 switch installation breaks subnet into LAN
segments
 switch filters packets:
 same-LAN-segment frames not usually
forwarded onto other LAN segments
 segments become separate collision domains
switch
collision
domain
hub
collision domain
hub
collision domain
hub
Q3-42
Switches: dedicated access
 Switch with many interfaces
A
 Hosts have direct connection to
switch
 No collisions; full duplex
Switching: A-to-A’ and B-to-B’
simultaneously, no collisions
C’
B
switch
C
B’
A’
Q3-43
Switches vs. Routers
 both store-and-forward devices


routers: network layer devices (examine network layer headers)
switches are link layer devices
 routers maintain routing tables, implement routing algorithms
 switches maintain switch tables, implement filtering, learning
algorithms
Application
Transport
Network
MAC
Physical
5 HTTP
4 TCP
3 IP
2 Eth-MAC
1 Eth-Phys.
1
Hub
Switch
Q3-44
Institutional network
to external
network
mail server
web server
router
switch
IP subnet
hub
hub
hub
Q3-45
VLANs
Port-based VLAN: switch ports grouped (by
switch management software) so that
single physical switch ……
Virtual Local
Area Network
Switch(es) supporting
VLAN capabilities can
be configured to
define multiple virtual
LANS over single
physical LAN
infrastructure.
1
7
9
15
2
8
10
16
…
…
Electrical Engineering
(VLAN ports 1-8)
Computer Science
(VLAN ports 9-15)
… operates as multiple virtual switches
1
7
9
15
2
8
10
16
…
Electrical Engineering
(VLAN ports 1-8)
…
Computer Science
(VLAN ports 9-16)
Q3-46
Port-based VLAN
router
 traffic isolation: frames
to/from ports 1-8 can only
reach ports 1-8

can also define VLAN based on
MAC addresses of endpoints,
rather than switch port
 dynamic membership:
ports can be dynamically
assigned among VLANs
1
7
9
15
2
8
10
16
…
Electrical Engineering
(VLAN ports 1-8)
…
Computer Science
(VLAN ports 9-15)
 forwarding between VLANS:
done via routing (just as with
separate switches)

in practice vendors sell combined
switches plus routers
Q3-47
Chapter 6 outline – Quiz 3
6.1 Introduction
Wireless
 6.2 Wireless links,
characteristics

CDMA (Carrier Detect)
 6.3 IEEE 802.11
wireless LANs (“wifi”)
 6.4 Cellular Internet
Access


architecture
standards (e.g., GSM)
Mobility
 6.5 Principles:
addressing and routing
to mobile users
 6.6 Mobile IP
 6.7 Handling mobility in
cellular networks
 6.8 Mobility and higherlayer protocols
6.9 Summary
Elements of a wireless network
wireless link




network
infrastructure
base station
 typically connected to wired
network
 relay - responsible for
sending packets between
wired network and wireless
host(s) in its “area”
 e.g., cell towers 802.11
access points
typically used to connect
mobile(s) to base station
also used as backbone link
multiple access protocol
coordinates link access
various data rates,
transmission distance
Elements of an ad hoc wireless network
Ad hoc mode
 no base stations
 nodes can only transmit
to other nodes within
link coverage
 nodes organize
themselves into a
network: route among
themselves
Wireless network characteristics
Multiple wireless senders and receivers create
additional problems (beyond multiple access):
C
A
B
Hidden terminal problem
 B, A hear each other
 B, C hear each other
B
A
 A, C can not hear each other
C
C’s signal
strength
A’s signal
strength
space
Signal fading:
 B, A hear each other
 B, C hear each other
means A, C unaware of their interference  A, C can not hear each other
interfering at B
at B
IEEE 802.11 Wireless LAN
 802.11a
 802.11b
 5-6 GHz range
 2.4-5 GHz unlicensed spectrum
 up to 54 Mbps
 up to 11 Mbps
 802.11g
 direct sequence spread
spectrum (DSSS) in physical
 2.4-5 GHz range
layer
 up to 54 Mbps
• all hosts use same chipping
 802.11n: multiple antennae
code
 2.4-5 GHz range
 up to 200 Mbps
 all use CSMA/CA for multiple access
 all have base-station and ad-hoc network versions
802.11 LAN architecture
 wireless host communicates
Internet
AP
BSS
1
hub, switch
or router
AP
BSS 2
with base station
 base station = access
point (AP)
 Basic Service Set (BSS)
(aka “cell”) in
infrastructure mode
contains:
 wireless hosts
 access point (AP or
WAP): base station
 ad hoc mode: hosts only
802.11: Channels, association
 802.11b: 2.4GHz - 2.485GHz spectrum divided into 11
channels at different frequencies (only 1, 6, 11 don't
overlap)
 AP admin chooses frequency for AP
 interference possible: channel can be same as that
chosen by neighboring AP!
 host: must associate with an AP
 scans channels, listening for beacon frames containing
AP’s name (SSID) and MAC address
 selects AP to associate with
 may perform authentication [Chapter 8]
 will typically run DHCP to get IP address in AP’s subnet
IEEE 802.11: multiple access
 avoid collisions: 2+ nodes transmitting at same time
 802.11: CSMA - sense before transmitting
 don’t collide with ongoing transmission by other node
 802.11: no collision detection!
 difficult to receive (sense collisions) when transmitting due
to weak received signals (fading)
 can’t sense all collisions in any case: hidden terminal, fading
 goal: avoid collisions: CSMA/C(ollision)A(voidance)
A
C
A
B
B
C
C’s signal
strength
A’s signal
strength
space
IEEE 802.11 MAC Protocol: CSMA/CA
802.11 sender
1 if sense channel idle for DIFS then
transmit entire frame (no CD)
2 if sense channel busy then
start random back-off time
timer counts down while channel idle
transmit when timer expires
if no ACK, increase random backoff
interval, repeat 2
802.11 receiver
- if frame received OK
return ACK after SIFS (ACK needed due
to hidden terminal problem)
sender
receiver
DIFS
data
SIFS
ACK
Collision Avoidance: RTS-CTS exchange
A
AP
B
reservation collision
DATA (A)
time
defer
802.11 frame: addressing
R1 router
H1
Internet
AP
R1 MAC addr H1* MAC addr
dest. address
AP MAC addr H1 MAC addr R1 MAC addr
address 1
address 2
address 3
802.11 frame
WiFi
source address
802.3 frame
Ethernet
802.11: mobility within same subnet
 H1 remains in same IP
subnet: IP address
can remain same
 switch: which AP is
associated with H1?
 self-learning
(Ch. 5):
switch will see frame
from H1 and
“remember” which
switch port can be
used to reach H1
router
hub or
switch
BBS 1
AP 1
AP 2
H1
BBS 2
802.15: personal area network - Blue Tooth
 less than 10 m diameter
 replacement for cables
(mouse, keyboard,
headphones)
 ad hoc: no infrastructure
 master/slaves:


Bluetooth specification


P
2.4-2.5 GHz radio band
up to 721 kbps
radius of
coverage
M
S
slaves request permission to
send (to master)
master grants requests
 802.15: evolved from
P
S
P
M
Master device
S
Slave device
P
S
P
Parked device (inactive)
Components of cellular network architecture
cell
 covers geographical
region
 base station (BS)
analogous to 802.11 AP
 mobile users attach
to network through BS
 air-interface:
physical and link layer
protocol between
mobile and BS
MSC
 connects cells to wide area net
 manages call setup (more later!)
 handles mobility (more later!)
Mobile
Switching
Center
Public telephone
network, and
Internet
Mobile
Switching
Center
wired network
Cellular networks: the first hop
Two techniques for sharing
mobile-to-BS radio
spectrum
 combined FDMA/TDMA:
divide spectrum in
frequency channels, divide
each channel into time
slots
frequency
bands
 CDMA: code division
multiple access
time slots
CDMA: two-sender interference
Orthogonal Codes
A
B
1
1
1
-1
1
-1
-1
-1
---0
Sum over i
Ai = 0
Bi = 0
Ai x Bi = 0
Ai x(-Bi) = 0
AxB
1
-1
1
1
1
-1
1
1
---0
1
-1
1
-1
1
1
-1
-1
---0
Cellular standards: Generations
1G systems: FM, voice, 1 mobile per frequency
2G systems: Digital, voice, many mobiles per freq.
3G systems: Digital, voice & data
Universal Mobile Telecommunications Service (UMTS)
 GSM next step, but using CDMA
CDMA-2000: CDMA in TDMA slots
(HSPA) 28 Mbps (AT&T)

1xEvolution Data Optimized
(1xEVDO) 14 Mbps (Verizon)
4G systems: Higher speed, like 802.17 WiMAX
As of August 2011, U.S. carriers currently use the following (most
will go to LTE):

AT&T = HSPA+
(63 Mbps) (2011 -> LTE)

Sprint = WiMax
(47 Mbps) (2013 -> LTE)

Verizon = LTE
(93 Mbps)

T-Mobile = HSPA+ (75 Mbps) (2013 -> LTE)

LTE
– 300 Mbps max. (700 MHz band, OFDMA)
LTE Advanced – 1000 Mbps max. (8x8 MIMO and 128 QAM)
Handoff with common MSC
 Handoff goal: route call via
new base station (without
interruption)
 reasons for handoff:

VLR Mobile
Switchin
g
Center
old
routing
old BSS

new
routing

new BSS
stronger signal to/from new
BSS (continuing connectivity,
less battery drain)
load balance: free up channel
in current BSS
GSM doesn’t mandate why to
perform handoff (policy), only
how (mechanism)
 handoff initiated by old BSS