15-744: computer networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfce693: adv....
TRANSCRIPT
![Page 1: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/1.jpg)
CE693: Adv. Computer Networking
L-9 Wireless
Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained from other sources, a a reference will be noted on the bottom of that slide. A full list of references is provided on the last slide.
![Page 2: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/2.jpg)
Wireless Intro
• TCP on wireless links• Wireless MAC• Assigned reading
• [BPSK97] A Comparison of Mechanism for Improving TCP Performance over Wireless Links
• [BM09] In Defense of Wireless Carrier Sense
2
![Page 3: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/3.jpg)
3
Wireless Challenges• Force us to rethink many assumptions• Need to share airwaves rather than wire
• Don’t know what hosts are involved• Host may not be using same link technology
• Mobility• Other characteristics of wireless
• Noisy lots of losses• Slow• Interaction of multiple transmitters at receiver
• Collisions, capture, interference• Multipath interference
![Page 4: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/4.jpg)
4
Overview
• Wireless Background
• Wireless MAC• MACAW• 802.11
• Wireless TCP
![Page 5: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/5.jpg)
Transmission Channel Considerations• Every medium supports
transmission in a certain frequency range.• Outside this range, effects such as
attenuation, .. degrade the signal too much
• Transmission and receive hardware will try to maximize the useful bandwidth in this frequency band.• Tradeoffs between cost, distance,
bit rate• As technology improves, these
parameters change, even for the same wire.• Thanks to our EE friends
5
Frequency
Good Bad
Signal
![Page 6: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/6.jpg)
The Nyquist Limit
• A noiseless channel of width H can at most transmit a binary signal at a rate 2 x H.• E.g. a 3000 Hz channel can transmit data at a
rate of at most 6000 bits/second• Assumes binary amplitude encoding
6
![Page 7: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/7.jpg)
Past the Nyquist Limit
• More aggressive encoding can increase the channel bandwidth.• Example: modems
• Same frequency - number of symbols per second• Symbols have more possible values
7
pskPsk+ AM
![Page 8: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/8.jpg)
Capacity of a Noisy Channel• Can’t add infinite symbols - you have to be able to tell them
apart. This is where noise comes in.
• Shannon’s theorem:• C = B x log(1 + S/N)• C: maximum capacity (bps)• B: channel bandwidth (Hz)• S/N: signal to noise ratio of the channel
• Often expressed in decibels (db). 10 log(S/N)• Example:
• Local loop bandwidth: 3200 Hz• Typical S/N: 1000 (30db)• What is the upper limit on capacity?
• Modems: Teleco internally converts to 56kbit/s digital signal, which sets a limit on B and the S/N.
8
![Page 9: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/9.jpg)
10
Cellular Reuse
• Transmissions decay over distance• Spectrum can be reused in different areas• Different “LANs”• Decay is 1/R2 in free space, 1/R4 in some
situations
![Page 10: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/10.jpg)
Multipath Effects• Receiver receives multiple
copies of the signal, each following a different path
• Copies can either strengthen or weaken each other.• Depends on whether they are in
or out of phase
• Small changes in location can result in big changes in signal strength.• Short wavelengths, e.g. 2.4 GHz
12 cm
• Difference in path length can cause inter-symbol interference (ISI).
11
![Page 11: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/11.jpg)
12
Fading - Example
• Frequency of 910 MHz or wavelength of about 33 cm
![Page 12: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/12.jpg)
13
Overview
• Wireless Background
• Wireless MAC• MACAW• 802.11
• Wireless TCP
![Page 13: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/13.jpg)
Medium Access Control
• Think back to Ethernet MAC:• Wireless is a shared medium• Transmitters interfere• Need a way to ensure that (usually) only one
person talks at a time.• Goals: Efficiency, possibly fairness
14
![Page 14: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/14.jpg)
15
Example MAC Protocols• Pure ALOHA
• Transmit whenever a message is ready• Retransmit when ACK is not received
• Slotted ALOHA• Time is divided into equal time slots• Transmit only at the beginning of a time slot• Avoid partial collisions• Increase delay, and require synchronization
• Carrier Sense Multiple Access (CSMA)• Listen before transmit• Transmit only when no carrier is detected
![Page 15: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/15.jpg)
16
CSMA/CD Does Not Work• Carrier sense
problems• Relevant contention
at the receiver, not sender
• Hidden terminal• Exposed terminal
• Collision detection problems• Hard to build a radio
that can transmit and receive at same time
A
B
C
A
BC
D
Hidden Exposed
![Page 16: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/16.jpg)
1-23-06Lecture 3: Physical Layer 17
C FA B EDRTS
RTS = Request-to-Send
MACA (RTS/CTS)
assuming a circular range
![Page 17: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/17.jpg)
1-23-06Lecture 3: Physical Layer 18
C FA B EDRTS
RTS = Request-to-Send
MACA (RTS/CTS)
NAV = 10
NAV = remaining duration to keep quiet
![Page 18: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/18.jpg)
1-23-06Lecture 3: Physical Layer 19
C FA B EDCTS
CTS = Clear-to-Send
MACA (RTS/CTS)
![Page 19: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/19.jpg)
1-23-06Lecture 3: Physical Layer 20
C FA B EDCTS
CTS = Clear-to-Send
MACA (RTS/CTS)
NAV = 8
![Page 20: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/20.jpg)
1-23-06Lecture 3: Physical Layer 21
C FA B EDDATA
•DATA packet follows CTS. Successful data reception acknowledged using ACK.
MACA (RTS/CTS)
![Page 21: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/21.jpg)
1-23-06Lecture 3: Physical Layer 22
C FA B ED
MACA (RTS/CTS)
Reserved area
![Page 22: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/22.jpg)
MACAW: Additional Design
• ACK (needed for faster TCP transfers)
• DS (needed since carrier sense disabled)RTS
CTS
Doesn’t hear CTSHears RTS
DS
Hears DS
DATA
23
![Page 23: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/23.jpg)
26
Overview
• Wireless Background
• Wireless MAC• MACAW• 802.11
• Wireless TCP
![Page 24: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/24.jpg)
28
802.11 particulars
• 802.11b (WiFi)• Frequency: 2.4 - 2.4835 Ghz DSSS• Rates: 1, 2, 5.5, 11 Mbps
• 802.11a: Faster, 5Ghz OFDM. Up to 54Mbps, 19+ channels
• 802.11g: Faster, 2.4Ghz, up to 54Mbps• 802.11n: 2.4 or 5Ghz, multiple antennas
(MIMO), up to 450Mbps (for 3x3 antenna configuration)
![Page 25: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/25.jpg)
30
Overview, 802.11 Architecture
STASTA
STA STA
STASTASTA STA
APAP
ESS
BSS
BSSBSS
BSS
Existing Wired LAN
Infrastructure Network
Ad Hoc Network
Ad Hoc Network
BSS: Basic Service SetESS: Extended Service Set
![Page 26: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/26.jpg)
31
802.11 modes
• Infrastructure mode• All packets go through a base station• Cards associate with a BSS (basic service set)• Multiple BSSs can be linked into an Extended
Service Set (ESS)• Handoff to new BSS in ESS is pretty quick
• Wandering around CE building• Moving to new ESS is slower, may require re-
addressing• Wandering from Sharif to Tehran U.
• Ad Hoc mode• Cards communicate directly.
![Page 27: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/27.jpg)
32
802.11 Management Operations
• Scanning• Association/Reassociation• Time synchronization• Power management
![Page 28: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/28.jpg)
33
Scanning & Joining• Goal: find networks in the area
• Passive scanning• No require transmission saves power• Move to each channel, and listen for Beacon frames
• Active scanning• Requires transmission saves time• Move to each channel, and send Probe Request frames to solicit
Probe Responses from a network
![Page 29: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/29.jpg)
34
Association in 802.11
AP
1: Association request
2: Association response
3: Data trafficClient
![Page 30: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/30.jpg)
35
Time Synchronization in 802.11
• Timing synchronization function (TSF)• AP controls timing in infrastructure networks• All stations maintain a local timer• TSF keeps timer from all stations in sync
• Periodic Beacons convey timing• Beacons are sent at well known intervals• Timestamp from Beacons used to calibrate
local clocks• Local TSF timer mitigates loss of Beacons
![Page 31: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/31.jpg)
36
Power Management in 802.11• A station is in one of the three states
• Transmitter on• Receiver on• Both transmitter and receiver off (dozing)
• AP buffers packets for dozing stations• AP announces which stations have frames
buffered in its Beacon frames• Dozing stations wake up to listen to the beacons• If there is data buffered for it, it sends a poll frame
to get the buffered data
![Page 32: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/32.jpg)
802.11 DCF ([RTS/CTS/]Data/ACK)
39
![Page 33: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/33.jpg)
40
Discussion
• RTS/CTS/Data/ACK vs. Data/ACK• Why/when is it useful?• What is the right choice• Why is RTS/CTS not used?
![Page 34: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/34.jpg)
41
802.11 Rate Adaptation• 802.11 spec specifies rates not algorithm
for choices• 802.11b 4 rates, 802.11a 8 rates, 802.11g 12
rates• Each rate has different modulation and coding
Transmission Rate then Loss Ratio
throughput decreases either way – need to get it just right
Transmission Rate then Capacity Utilization
![Page 35: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/35.jpg)
Carrier Sense
43
![Page 36: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/36.jpg)
Single Receiver, Sender and Interferer
45
![Page 37: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/37.jpg)
Interferer Position
46
![Page 38: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/38.jpg)
ABR Helps in Disagreements
47
![Page 39: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/39.jpg)
Carrier Sense + ABR Works Well
48
![Page 40: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/40.jpg)
Key Assumptions
• ABR == Shannon• ABR is rarely this good
• Interference and ABR are both stable• Interference may be bursty/intermittent
49
![Page 41: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/41.jpg)
50
Overview
• Wireless Background
• Wireless MAC• MACAW• 802.11
• Wireless TCP
![Page 42: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/42.jpg)
51
Wireless Challenges• Force us to rethink many assumptions• Need to share airwaves rather than wire
• Don’t know what hosts are involved• Host may not be using same link technology
• Mobility• Other characteristics of wireless
• Noisy lots of losses• Slow• Interaction of multiple transmitters at receiver
• Collisions, capture, interference• Multipath interference
![Page 43: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/43.jpg)
52
TCP Problems Over Noisy Links
• Wireless links are inherently error-prone• Fades, interference, attenuation• Errors often happen in bursts
• TCP cannot distinguish between corruption and congestion• TCP unnecessarily reduces window, resulting in
low throughput and high latency• Burst losses often result in timeouts• Sender retransmission is the only option
• Inefficient use of bandwidth
![Page 44: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/44.jpg)
53
Constraints & Requirements
• Incremental deployment• Solution should not require modifications to
fixed hosts• If possible, avoid modifying mobile hosts
• Probably more data to mobile than from mobile• Attempt to solve this first
![Page 45: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/45.jpg)
54
Challenge #1: Wireless Bit-Errors
Router
Computer 2Computer 1
2322
Loss Congestion
21 0
Burst losses lead to coarse-grained timeoutsResult: Low throughput
Loss Congestion
Wireless
![Page 46: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/46.jpg)
Performance Degradation
0
525000
1050000
1575000
2100000
0 15 30 45 60
Time (s)
Seq
uenc
e nu
mbe
r (by
tes)
TCP Reno(280 Kbps)
Best possible TCP with no errors(1.30 Mbps)
2 MB wide-area TCP transfer over 2 Mbps Lucent WaveLAN55
![Page 47: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/47.jpg)
56
Proposed Solutions
• End-to-end protocols• Selective ACKs, Explicit loss notification
• Split-connection protocols• Separate connections for wired path and
wireless hop• Reliable link-layer protocols
• Error-correcting codes• Local retransmission
![Page 48: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/48.jpg)
57
Approach Styles (End-to-End)• Improve TCP implementations
• Not incrementally deployable• Improve loss recovery (SACK, NewReno)• Help it identify congestion (ELN, ECN)
• ACKs include flag indicating wireless loss
• Trick TCP into doing right thing E.g. send extra dupacks• What is SMART?
• DUPACK includes sequence of data packet that triggered it
Wired link Wireless link
![Page 49: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/49.jpg)
58
Approach Styles (Split Connection)
• Split connections• Wireless connection need not be TCP• Hard state at base station
• Complicates mobility• Vulnerable to failures• Violates end-to-end semantics
Wired link Wireless link
![Page 50: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/50.jpg)
Split-Connection Congestion Window
• Wired connection does not shrink congestion window • But wireless connection times out often, causing sender to stall
0
10000
20000
30000
40000
50000
60000
0 20 40 60 80 100 120Time (sec)
Con
gest
ion
Win
dow
(byt
es)
Wired connectionWireless connection
59
![Page 51: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/51.jpg)
60
Approach Styles (Link Layer)• More aggressive local rexmit than TCP
• Bandwidth not wasted on wired links
• Adverse interactions with transport layer• Timer interactions• Interactions with fast retransmissions• Large end-to-end round-trip time variation
• FEC does not work well with burst lossesWired link Wireless link
ARQ/FEC
![Page 52: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/52.jpg)
61
Hybrid Approach: Snoop Protocol• Shield TCP sender from wireless vagaries
• Eliminate adverse interactions between protocol layers• Congestion control only when congestion occurs
• The End-to-End Argument [SRC84]• Preserve TCP/IP service model: end-to-end semantics
• Eliminate non-TCP protocol messages
Fixed to mobile: transport-aware link protocolMobile to fixed: link-aware transport protocol
![Page 53: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/53.jpg)
62
Snoop Overview
• Modify base station• to cache un-acked TCP packets• … and perform local retransmissions
• Key ideas• No transport level code in base station• When node moves to different base station,
state eventually recreated there
![Page 54: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/54.jpg)
Snoop Protocol: CH to MH
Correspondent Host
Mobile HostBase Station
5 11234
6
• Snoop agent: active interposition agent• Snoops on TCP segments and ACKs• Detects losses by duplicate ACKs and timers• Suppresses duplicate ACKs from MH
Snoop Agent
63
![Page 55: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/55.jpg)
Snoop Protocol: CH to MH
Correspondent Host
Mobile HostBase Station
• Transfer of file from CH to MH• Current window = 6 packets
Snoop Agent6 5 43 21
64
![Page 56: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/56.jpg)
Snoop Protocol: CH to MH
Correspondent Host
Mobile HostBase Station
• Transfer begins
Snoop Agent6 54 3 2 1
65
![Page 57: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/57.jpg)
Snoop Protocol: CH to MH
Correspondent Host
Mobile HostBase Station
5 11234
6
• Snoop agent caches segments that pass by
Snoop Agent
66
![Page 58: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/58.jpg)
Snoop Protocol: CH to MH
Correspondent Host
Mobile HostBase Station
51234
6
• Packet 1 is Lost
Snoop Agent23 1
Lost Packets1
67
![Page 59: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/59.jpg)
Snoop Protocol: CH to MH
Correspondent Host
Mobile HostBase Station
5 12346
• Packet 1 is Lost• Duplicate ACKs generated
Snoop Agent
23
Lost Packets1
4
ack 1
68
![Page 60: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/60.jpg)
Snoop Protocol: CH to MH
Correspondent Host
Mobile HostBase Station
5 12346
• Packet 1 is Lost• Duplicate ACKs generated
• Packet 1 retransmitted from cache at higher priority
Snoop Agent
23
Lost Packets1
4
ack 1
56 1
ack 1
69
![Page 61: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/61.jpg)
Snoop Protocol: CH to MH
Correspondent Host
Mobile HostBase Station
5 12346
• Duplicate ACKs suppressed
Snoop Agent
234
ack 5
561
ack 1X
70
![Page 62: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/62.jpg)
Snoop Protocol: CH to MH
Correspondent Host
Mobile HostBase Station
56
• Clean cache on new ACK
Snoop Agent
234
ack 6
615
ack 5
71
![Page 63: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/63.jpg)
Snoop Protocol: CH to MH
Correspondent Host
Mobile HostBase Station
6
• Clean cache on new ACK
Snoop Agent
234
ack 7
156
ack 6
ack 5
72
![Page 64: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/64.jpg)
Snoop Protocol: CH to MH
Correspondent Host
Mobile HostBase Station
• Active soft state agent at base station • Transport-aware reliable link protocol • Preserves end-to-end semantics
Snoop Agent
234
ack 7
156978
ack 6
73
![Page 65: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/65.jpg)
74
Performance: FH to MH
0
1.25
2.50
3.75
5.00
0 750 1500 2250 3000
1/Bit-error Rate (1 error every x Kbits)
Thro
ughp
ut (M
bps)
Typical error rates
2 MB local-area TCP transfer over 2 Mbps Lucent WaveLAN
•Snoop+SACK and Snoop perform best
•Connection splitting not essential
•TCP SACK performance disappointingTCP Reno
SPLIT
TCP SACK
SPLIT-SACK
Snoop
Snoop+SACK
![Page 66: 15-744: Computer Networkingsina.sharif.edu/~kharrazi/courses/40693-911/08-wireless.pdfCE693: Adv. Computer Networking L-9 Wireless Acknowledgments: Lecture slides are from the graduate](https://reader037.vdocuments.mx/reader037/viewer/2022090610/606f9449b4639323d136c14e/html5/thumbnails/66.jpg)
Discussion
• Real link-layers aren’t windowed• Out of order delivery not that significant a
concern
• TCP timers are very conservative
75