CN Module 5 PPT -2
CN Module 5 PPT -2
▪ Wireless hosts
▪ A wireless host might be a laptop, palmtop, smartphone, or desktop computer. The hosts themselves may or may
not be mobile
▪ Wireless links
▪ A host connects to a base station through a wireless communication link
▪ Different wireless link technologies have different transmission rates and can transmit over different distances
▪ Base station
▪ The base station is a key part of the wireless network infrastructure
▪ A base station is responsible for sending and receiving data to and from a wireless host that is associated with
that base station
Elements of a wireless network
Introduction
▪ A wireless host is “associated” with a base station
▪ Means
▪ the host is within the wireless communication distance of the base station
▪ the host uses that base station to relay data between the host and the larger network
▪ Cell towers in cellular networks and access points in 802.11 wireless LANs are examples of base
stations
▪ Hosts associated with a base station are often referred to as operating in infrastructure mode, since
all traditional network services (e.g., address assignment and routing) are provided by the network
▪ In ad hoc networks, wireless hosts have no such infrastructure with which to connect, so the hosts
themselves must provide for services such as routing, address assignment etc.
Introduction
▪ When a mobile host moves beyond the range
of one base station and into the range of
another, it will change its point of attachment
into the larger network—a process referred to
as handoff
▪ Network infrastructure
▪ This is the larger network with which a
wireless host may wish to communicate
Classification of Wireless Networks
▪ Classification of wireless networks according to two criteria:
▪ whether a packet in the wireless network crosses exactly one wireless hop or multiple wireless hops
▪ whether there is infrastructure such as a base station in the network
3. Multipath propagation
▪ Occurs when portions of the electromagnetic wave reflect off objects and the ground, taking
paths of different lengths between a sender and receiver
Wireless Links and Network Characteristics
▪ Signal-to-noise ratio (SNR)
▪ is a relative measure of the strength of the received signal (i.e., the information
being transmitted) and this noise
▪ measured in units of decibels (dB)
▪ a larger SNR makes it easier for the receiver to extract the transmitted signal
from the background noise
Wireless Link Characteristics
10-1
BER
10-4
▪ SNR versus BER tradeoffs
▪ given physical layer: increase power -> 10-5
increase SNR->decrease BER
10-6
▪ given SNR: choose physical layer that
meets BER requirement, giving highest
thruput 10-7
10 20 30 40
▪ SNR may change with mobility: SNR(dB)
dynamically adapt physical layer
(modulation technique, rate) QAM256 (8 Mbps)
QAM16 (4 Mbps)
BPSK (1 Mbps)
Wireless Links and Network Characteristics
▪ For a given SNR, a modulation technique with a higher bit transmission rate (whether in error
or not) will have a higher BER
▪ QAM16 would make it the preferred modulation technique in this situation
▪ Dynamic selection of the physical-layer modulation technique can be used to adapt the
modulation technique to channel conditions
▪ the selection of a modulation technique that provides the highest transmission rate possible
▪ In case of wired broadcast links, all nodes receive the transmissions from all other nodes
▪ In the case of wireless links, hidden terminal problem and fading makes it complex
Wireless network characteristics
Multiple wireless senders and receivers create additional problems
(beyond multiple access):
M
Di = S Zi,m.cm
m=1
M
received 1 1 1 1 1 1 1 1
d0 = 1
input -1 -1 -1 -1 -1 -1 -1 -1 d1 = -1
1 1 1 1 1 1 1 1 slot 1 slot 0
code channel channel
-1 -1 -1 -1 -1 -1 -1 -1
Sender 2
Active Scanning
Passive Scanning ▪ Probe Request frame broadcast from H1
▪ beacon frames sent from Aps ▪ Probe Response frames sent from APs
▪ association Request frame sent: H1 to ▪ Association Request frame sent: H1 to
selected AP selected AP
▪ association Response frame sent from ▪ Association Response frame sent from
selected AP to H1 selected AP to H1
The 802.11 Architecture
▪ To create an association with a particular AP, the wireless station may be required
to authenticate itself to the AP
▪ First approach, used by many companies, is to permit access to a wireless
network based on a station’s MAC address
▪ Second approach, used by many Internet cafés, employs usernames and
passwords
▪ In both cases, the AP communicates with an authentication server, relaying
information between the wireless end-point station and the authentication server
using a protocol such as RADIUS [RFC 2865] or DIAMETER [RFC 3588]
The 802.11 MAC Protocol
▪ Multiple stations may want to transmit data frames at the same time over the
same channel, a multiple access protocol is needed to coordinate the
transmissions
▪ A station is either a wireless station or an AP(access point)
▪ 802.11 chose a random-access protocol for 802.11 wireless LANs, referred to as
CSMA with collision avoidance (CSMA/CA)
▪ “CSMA” in CSMA/CA stands for “carrier sense multiple access,” meaning that
each station senses the channel before transmitting, and refrains from
transmitting when the channel is sensed busy
Difference between CSMA/CD and CSMA/CA
▪ The two MAC protocols have important differences:
▪ AGENT ADVERTISEMENT
▪ a foreign or home agent advertises its services using an extension to the existing
router discovery protocol [RFC 1256]
Agent Discovery
▪ The agent periodically broadcasts an ICMP message with a type field of 9 (router
discovery) on all links to which it is connected
▪ The router discovery message contains the IP address of the router, thus
allowing a mobile node to learn the agent’s IP address
▪ The router discovery message also contains a mobility agent advertisement
extension that contains additional information:
▪ Home agent bit (H)
▪ Foreign agent bit (F)
▪ Registration required bit (R)
▪ M, G encapsulation bits
▪ Care-of address (COA) fields
Agent Discovery
▪ ICMP router
discovery message
with mobility agent
advertisement
extension
Registration with the Home Agent
▪ Once a mobile IP node has received a COA, that address must be registered with
the home agent
▪ Four steps are involved:
▪ Following the receipt of a foreign agent advertisement, a mobile node sends a mobile IP
registration message to the foreign agent
▪ The foreign agent receives the registration message and records the mobile node’s
permanent IP address, The foreign agent then sends a mobile IP registration message
to port 434 of the home agent
▪ The home agent receives the registration request and checks for authenticity and
correctness, The home agent sends a mobile IP registration reply
▪ The foreign agent receives the registration reply and then forwards it to the mobile node
Registration with the Home Agent
▪ Registration is complete, and the mobile node can receive datagrams sent to its
permanent address
▪ Home agent specifies a lifetime that is smaller than the lifetime requested by the
mobile node
▪ A foreign agent need not explicitly deregister a COA when a mobile node
leaves its network
▪ This will occur automatically, when the mobile node moves to a new network
and registers a new COA
Agent advertisement and
mobile IP registration