Upload
ashlee-nelson
View
218
Download
0
Embed Size (px)
DESCRIPTION
P2P Tasks Search: general keyword/wildcard search –Controlled flooding Lookup: given name, get IP address of location –DHT or similar structure Download: –Chunking is used because of asymmetric bandwidth –Self-scaling depends on an incentive mechanism oPrevent free-riders 3
Citation preview
WirelessEE 122: Intro to Communication Networks
Fall 2010 (MW 4-5:30 in 101 Barker)
Scott Shenker
TAs: Sameer Agarwal, Sara Alspaugh, Igor Ganichev, Prayag Narula
http://inst.eecs.berkeley.edu/~ee122/
Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxsonand other colleagues at Princeton and UC Berkeley
Review of Last Lecture• Peer-to-peer:
– Design paradigm: No central contol– Economic model: leverage user nodes
• As an economic model:– Latest step in war over control– Grassroots way to build large-scale system– But need good coordination mechanism
2
P2P Tasks• Search: general keyword/wildcard search
– Controlled flooding
• Lookup: given name, get IP address of location– DHT or similar structure
• Download:– Chunking is used because of asymmetric bandwidth– Self-scaling depends on an incentive mechanism
o Prevent free-riders
3
4
Wireless Networks
Wireless Communication Standards • Cellular
– 2G: GSM (Global System for Mobile communication), CDMA (Code Division Multiple Access)
– 3G: CDMA2000
• IEEE 802.11– A: 5.0Ghz band, 54Mbps (25 Mbps operating rate)– B: 2.4Ghz band, 11Mbps (4.5 Mbps operating rate)– G: 2.4Ghz, 54Mbps (19 Mbps operating rate)– N: 2.4/5Ghz, 150Mbps
• IEEE 802.15 – lower power wireless– 802.15.1: 2.4Ghz, 2.1 Mbps (Bluetooth)– 802.15.4: 2.4Ghz, 250 Kbps (Sensor Networks)
5
Wireless Link Characteristics
6
(Figure Courtesy of Kurose and Ross)
What Makes Wireless Different?• Signals sent by sender don’t always end up at
receiver intact– Complicated physics involved, which we won’t discuss– But what can go wrong?
• Two quantities we care about:– Signal-to-noise ratio (SNR)
o Signal Power/Noise Power– Bit-Error Rate (BER)
7
Path Loss• Signal power attenuates by about ~r2 factor for
omni-directional antennas in free space– r is the distance between the sender and the receiver
• The exponent depends on placement of antennas
• Less than 2 for directional antennas
• Greater than 2 when antennas are placed on the ground– Signal bounces off the ground and reduces the power of
the signal
8
Multipath Effects
• Signals bounce off surface and interfere with one another
• Self-interference
9
S R
Ceiling
Floor
Interference from Other Sources• External Interference
– Microwave is turned on and blocks your signal
• Internal Interference– Hosts within range of each other collide with one another
’s transmission (remember Aloha)
• We have to tolerate path loss, multipath, etc., but we can try to avoid internal interference
• This is what makes 802.11 interesting….
10
Ideal Radios(courtesy of Gilman Tolle and Jonathan Hui, ArchRock)
Real Radios(courtesy of Gilman Tolle and Jonathan Hui, ArchRock)
13
The Amoeboed “cell”(courtesy of David Culler, UCB)
Signal
Noise
Distance
Wireless Bit Errors
• The lower the SNR (Signal/Noise) the higher the Bit Error Rate (BER)
• We could make the signal stronger…
• Why is this not always a good idea?– Increased signal strength requires more power– Increases the interference range of the sender, so you
interfere with more nodes around youo And then they increase their power…….
• Error Correction schemes can correct some problems
14
15
802.11
802.11 Architecture
• Designed for limited area
• AP’s (Access Points) set to specific channel
• Broadcast beacon messages with SSID (Service Set Identifier) and MAC Address periodically
• Hosts scan all the channels to discover the AP’s– Host associates with AP (actively or passively)
16
802.11 frames exchanges
802.3 (Ethernet) frames
exchanged
Wireless Multiple Access Technique?• Carrier Sense?
– Sender can listen before sending– What does that tell the sender?
• Collision Detection?– Where do collisions occur?– How can you detect them?
17
18
• A and C can both send to B but can’t hear each other– A is a hidden terminal for C and vice versa
• Carrier Sense will be ineffective – need to sense at receiver
Hidden Terminals
A B C
transmit range
19
Exposed Terminals
• Exposed node: B sends a packet to A; C hears this and decides not to send a packet to D (despite the fact that this will not cause interference)!
• Carrier sense would prevent a successful transmission– But we do carrier sense anway (why?)
A B C D
Key Points• No concept of a global collision
– Different receivers hear different signals– Different senders reach different receivers
• Collisions are at receiver, not sender– Only care if receiver can hear the sender clearly– It does not matter if sender can hear someone else– As long as that signal does not interfere with receiver
• Goal of protocol:– Detect if receiver can hear sender– Tell senders who might interfere with receiver to shut up20
Basic Collision Avoidance• Since can’t detect collisions, we try to avoid them
• Carrier sense:– When medium busy, choose random interval– Wait that many idle timeslots to pass before sending
• When a collision is inferred, retransmit with binary exponential backoff (like Ethernet) – Use ACK from receiver to infer “no collision”– Use exponential backoff to adapt contention window
• How would we get ACKs if we didn’t do carrier sense?
21
22
MA with Collision Avoidance (MACA)
• Before every data transmission – Sender sends a Request to Send (RTS) frame containing the length
of the transmission– Receiver respond with a Clear to Send (CTS) frame– Sender sends data– Receiver sends an ACK; now another sender can send data
• When sender doesn’t get a CTS back, it assumes collision
sender receiver other node in sender’s range
RTS
ACK
dataCTS
23
MACA, con’t
• If other nodes hear RTS, but not CTS: send– Presumably, destination for first sender is out of
node’s range …
senderreceiver other node in
sender’s rangeRTS
dataCTS
data
24
MACA, con’t
• If other nodes hear RTS, but not CTS: send– Presumably, destination for first sender is out of node’s range
…– … Can cause problems when a CTS is lost
• When you hear a CTS, you keep quiet until scheduled transmission is over (hear ACK)
sender receiver other node in sender’s range
RTS
ACK
dataCTS
25
Overcome hidden terminal problems with contention-free protocol1. B sends to C Request To Send (RTS)2. A hears RTS and defers (to allow C to answer)3. C replies to B with Clear To Send (CTS)4. D hears CTS and defers to allow the data5. B sends to C
RTS / CTS Protocols (MACA)
B C DRTS
CTSA
B sends to C
26
5 Minute Break
Questions Before We Proceed?
27
Channelization of spectrum
• Typically, available frequency spectrum is split into multiple channels
• Some channels may overlap
26 MHz 100 MHz 200 MHz 150 MHz
2.45 GHz 915 MHz 5.25 GHz 5.8 GHz
3 channels 8 channels 4 channels
250 MHz 500 MHz 1000 MHz
61.25 GHz24.125 GHz 122.5 GHz
Preventing Collisions Altogether• Frequency Spectrum partitioned into several
channels– Nodes within interference range can use separate
channels
– Now A and C can send without any interference!– Aggregate Network throughput doubles
28
AB
CD
Using Multiple Channels
• 802.11: AP’s on different channels– Usually manually configured by administrator– Automatic Configuration may cause problems
• Most cards have only 1 transceiver– Not Full Duplex: Cannot send and receive at the same
time
• Multichannel MAC Protocols– Automatically have nodes negotiate channels
o Channel coordination amongst nodes is necessaryo Introduces negotiation and channel-switching latency that reduce
throughput
29
Wireless Multihop Networks• Vehicular Networks
– Delay Tolerant (batch) sending over several hops carry data to a base station
• Common in Sensor Network for periodically transmitting data– Infrastructure Monitoring
o E.g., structural health monitoring of the Golden Gate Bridge
• Multihop networking for Internet connection sharing– Routing traffic over several hops to base station
connected to Internet– E.g., Meraki Networks 30
Large Multihop Network(courtesy of Sanjit Biswas, MIT)
1 kilometer
Multi-Hop Wireless Ad Hoc Networks (Courtesy of Tianbo Kuang and Carey Williamson University of Calgary)
R
AB
C
D
S
33
Multi-Hop Wireless Ad Hoc Networks
R
AB
C
D
S
34
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
123456789101112
(Assume ideal world…)
35
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
1
23456789101112
36
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
1
2
3456789101112
37
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
12
3
456789101112
38
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
12
3
456789101112
39
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1
23
4
56789101112
40
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1
2
345
6789101112
41
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D12
3
456
7
89101112
42
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D123
4
567
8
9101112
43
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1234
5
67
8
9
101112
44
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D12345
6
789
10
1112
45
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D123456
7
8910
11
12
46
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1234567
8
910
11
12
47
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D12345678
9
101112
48
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D123456789
10
1112
49
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D12345678910
11
12
50
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1234567891011
12
51
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D123456789101112
What Do YOU Think Really Happens?
52
53
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
123456789101112
Problem 1: node A can’t use bothof these links at the same time - shared wireless channel - transmit or receive, but not both
(Reality check…)
54
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
123456789101112
Problem 2: S and B can’t use bothof these links at same time - range overlap at A
55
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
123456789101112
Problem 3: LOTS ofcontention for the channel - in steady state, all want to send - need RTS/CTS to resolve contention
RTS: Request-To-SendCTS: Clear-To-Send
56
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
123456789101112
RTS CTS
57
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
1
23456789101112
58
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
1
23456789101112
RTS CTS
59
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
1
23456789101112
60
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
1
23456789101112
61
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
1
2
3456789101112
62
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D 1
2
3456789101112
63
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1
2
3456789101112
64
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1
2
3
456789101112
65
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1
2
3
456789101112
66
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D12
3
456789101112
67
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D12
3
456789101112
68
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D12
3
4
56789101112
69
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D123
4
56789101112
70
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
123456789101112
Problem 4: TCP uses ACKS to indicate reliable data delivery - bidirectional traffic (DATA, ACKS) - even more contention!!!
71
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
1
23456789101112
72
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
1
23456789101112
73
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
1
23456789101112
74
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D
1
2
3456789101112
75
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D 1
2
3456789101112
76
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1
2
3456789101112
11
12
2
77
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1
3
456789101112 12
78
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1
3
456789101112 1
2
79
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1
3
456789101112 1
2
80
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1
3
456789101112
1
2
81
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1
3
456789101112
1
2
82
Multi-Hop Wireless Ad Hoc Networks
S
R
AB
C
D1
3
456789101112
1
2
2
Lesson• Multihop wireless is hard to make efficient
83
Summary• Wireless is a tricky beast
– Distributed multiple access problem– Hidden terminals– Exposed terminals– Current protocols sufficient, given overprovisioning
• Multihop even more complicated
84
Rest of Course• Next lecture: Security
• After that: Future of Networking– Why things will look completely different in ten years
• Review
85