Sunteți pe pagina 1din 34

1

WIRELESS LAN
A fast-growing market introducing the flexibility of wireless access into office, home, or production environments. WLANs are typically restricted in their diameter to buildings, a campus, single rooms etc. and are operated by individuals, not by large-scale network providers. The global goal of WLANs is to replace office cabling, to enable join less access to the internet and, to introduce a higher flexibility for ad-hoc communication in, e.g., group meetings.

Advantages of WLANs are:


Flexibility: o Within radio coverage, nodes can communicate without further restriction. Radio waves can penetrate walls, senders and receivers can be placed anywhere (also non-visible, e.g., within devices, in walls etc.). Planning: o No prior planning is required for connectivity as long as devices follow standard convention. Design: o Wireless networks allow for the design of small, independent devices which can for example be put into a pocket. o Wireless senders and receivers can be hidden in historic buildings, i.e., current networking technology can be introduced without being visible. Robustness: o Wireless networks can survive disasters, e.g., earthquakes or users pulling a plug. If the wireless devices survive, people can still communicate. Cost: o After providing wireless access to the infrastructure via an access point for the first user, adding additional users to a wireless network will not increase the cost. This is, important for e.g., lecture halls, hotel lobbies or gate areas in airports.

Disadvantages of WLANs are:


Quality of service: o WLANs typically offer lower quality than their wired counterparts. o The main reasons for this are the lower bandwidth due to limitations in radio transmission (e.g., only 110 Mbit/s user data rate instead of 1001,000 Mbit/s). o Higher delay in error correction and detection mechanisms. Proprietary solutions: o Slow standardization procedures.
IT2402 Mobile Communication Year-IV Semester-VII UNIT 2 (Wireless Network)

Restrictions: o All wireless products have to obey with national regulations. Several government and non-government institutions restrict frequencies to minimize interference. Safety and security: o Using radio waves for data transmission might interfere with other high-tech equipment, e.g., hospitals.

Competing Requirement
Global operation: o WLAN products should sell in all countries so, national and international frequency regulations have to be considered. o Wireless LAN equipment may be carried from one country into another the operation should still be legal in this case. Low power: o Wireless devices running on battery power. The LAN design should take this into account and implement special power-saving modes and power management functions. License-free operation: o Should be able to operate the WLAN without license. Robust transmission technology: o Compared to their wired counterparts, WLANs operate under difficult conditions. If they use radio transmission, many other electrical devices can interfere with them (vacuum cleaners, hairdryers, train engines etc.). Easy to use: o Must be easy to use by a common man without complicated procedure Protection of investment: o A lot of money has already been invested into wired LANs. The new WLANs should protect this investment by being interoperable with the existing networks. Safety and security: o Wireless LANs should be safe to operate, especially regarding low radiation if used, e.g., in hospitals. Users cannot keep safety distances to antennas. The equipment has to be safe for leader. o Users should not be able to read personal data during transmission, i.e., encryption mechanisms should be integrated. Transparency for applications: o Existing applications should continue to run over WLANs, the only difference being higher delay and lower bandwidth.
IT2402 Mobile Communication Year-IV Semester-VII UNIT 2 (Wireless Network)

Infra red Vs Radio Transmission


Now days we have used 2 Basic Transmission Technology. The transmission Technologies are Infra red and Radio Transmission.

Infrastructure and ad-hoc network The two basic alternative of wireless networks are infrastructure-based and ad-hoc.
Infrastructure Normally infrastructure is used to access other network. Infrastructure networks not only provide access to other networks, but also include forwarding functions, medium access control etc. In these infrastructure-based wireless networks, communication is done between the wireless nodes and the access point. The access point does not just control medium access, but also acts as a bridge to other wireless or wired networks. The design of infrastructure-based wireless networks is simpler because most of the network functionality lies within the access point, whereas the wireless clients can remain quite simple. This type of network can use different access schemes with or without collision. Collisions may occur if medium access of the wireless nodes and the access point is not coordinated. However, if only the access point controls medium access, no collisions are possible.
IT2402 Mobile Communication Year-IV Semester-VII UNIT 2 (Wireless Network)

This setting may be useful for quality of service guarantees such as minimum bandwidth for certain nodes. Typical cellular phone networks are infrastructure-based networks for a wide area. Ad-hoc network Each node can communicate directly with other nodes, so no access point controlling medium access is necessary. The below figure shows two ad-hoc networks with three nodes each. Nodes within an ad-hoc network can only communicate if they can reach each other physically, i.e., if they are within each others radio range.

. In ad-hoc networks, the complexity of each node is higher because every node has to implement medium access mechanisms. The mechanisms to handle hidden or exposed terminal problems, and perhaps priority mechanisms, to provide a certain quality of service. This type of wireless network display the greatest possible flexibility as it is, for example, needed for unexpected meetings, quick replacements of infrastructure. However, ad-hoc networks might only have selected nodes with the capabilities of forwarding data. Most of the nodes have to connect to such a special node first to transmit data if the receiver is out of their range. The three WLANs presented, IEEE 802.11 and HiperLAN2 are typically infrastructurebased networks, which additionally support ad-hoc networking. The third WLAN, Bluetooth is a typical wireless ad-hoc network. Bluetooth focuses precisely on unplanned ad-hoc meetings or on the simple connection of two or more devices without requiring the setup of an infrastructure.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

IEEE 802.11 ARCHITECUTRE AND SERVICES


In 1990, the IEEE 802 Committee formed a new working group, IEEE 802.11, specifically dedicated to wireless LANs. Its agreement to develop a MAC protocol and physical medium specification. The initial interest was in developing a wireless LAN operating in the ISM (industrial, scientific, and medical) band. At the same time, increasing the WLAN needed. So the team expanding the list of standards.

Wi-Fi Alliance
The first 802.11 standard, the industry accepted 802.11b. Although 802.11b products are all based on the same standard. This organization, subsequently renamed the Wi-Fi (Wireless Fidelity) Alliance, created a test suite to certify interoperability for 802.11b products.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

IEEE 802.11 System Architecture:

The smallest building block of a wireless LAN is a basic service set (BSS). BSS consists of some number of stations executing the same MAC protocol and access to the same shared wireless medium. A BSS may be connecting to a backbone distribution system (DS) through an access point (AP). The AP functions as a bridge and a relay point. In a BSS, client stations do not communicate directly with one another. If one station in the BSS wants to communicate with another station in the same BSS. The MAC frame is first sent from the beginning station to the AP, and then from the AP to the destination station. Similarly, a MAC frame from a station in the BSS to a remote station is sent from the local station to the AP and then relayed by the AP over the DS on its way to the destination station. The DS can be a switch, a wired network, or a wireless network. When all the stations in the BSS are mobile stations, with no connection to other BSSs, the BSS is called an independent BSS (IBSS). It also called ad hoc network. In an IBSS, the stations all communicate directly, and no AP is involved. An extended service set (ESS) consists of two or more basic service sets interconnected by a distribution system. Normally, the distribution system is a wired or wireless. The extended service set (ESS) appears as a single logical LAN to the logical link control (LLC) level. Here Access point (AP) is a part of the station.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

IEEE 802.11 Protocol Architecture: The IEEE 802.11 standard only covers the physical layer PHY and medium access layer MAC like the other 802.x LANs do. The physical layer is subdivided into the physical layer convergence protocol (PLCP) and the physical medium dependent sublayer PMD as shown in the below figure. The basic tasks of the MAC layer comprise (includes) medium access, fragmentation of user data, and encryption. The PLCP sublayer provides a carrier sense signal, called clear channel assessment (CCA), and provides a common PHY service access point (SAP). Finally, the PMD sublayer handles modulation and encoding/decoding of signals.

IEEE 802.11 Physical Layer: IEEE 802.11 supports three different physical layers: One layer based on infra red and two (DSSS & FHSS) layers based on radio transmission (the ISM band at 2.4 GHz). Frequency hopping spread spectrum:( FHSS) The total bandwidth is split into many channels of smaller bandwidth. Frequency hopping spread spectrum (FHSS) is a spread spectrum technique which allows for the coexistence of multiple networks in the same area by separating different networks using different hopping sequences. The frame consists of two basic parts, the PLCP part (preamble and header) and the payload part. PLCP part is always transmitted at 1 Mbit/s, payload (MAC data), can use 1 or 2 Mbit/s. additionally.

The fields of the frame fulfill the following functions:

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

o Synchronization: The PLCP preamble starts with 80 bit synchronization, which is a 010101... bit pattern. o Start frame delimiter (SFD): The following 16 bits indicate the start of the frame and provide frame synchronization. The SFD pattern is 0000110010111101. o PLCP_PDU length word (PLW): This first field of the PLCP header indicates the length of the payload in bytes including the 32 bit CRC at the end of the payload. o Header error check (HEC): Finally, the PLCP header is protected by a 16 bit checksum. Direct sequence spread spectrum (DSSS): Direct sequence spread spectrum (DSSS) is the alternative spread spectrum method separating by code and not by frequency. In IEEE 802.11 DSSS, spreading is achieved using the 11-chip Barker sequence (+1, 1, +1, +1, 1, +1, +1, +1, 1, 1, 1). IEEE 802.11 DSSS PHY also uses the 2.4 GHz ISM band and offers both 1 and 2 Mbit/s data rates. A physical frame of the physical layer using DSSS. The frame consists of two basic parts, the PLCP part (preamble and header) and the payload part. The PLCP part is always transmitted at 1 Mbit/s, payload. The fields of the frame have the following functions: o Synchronization: The first 128 bits are not only used for synchronization, but also gain setting, energy detection (for the CCA), and frequency offset compensation. o Start frame delimiter (SFD): This 16 bit field is used for synchronization at the beginning of a frame. o Signal: Originally, only two values have been defined for this field to indicate the data rate of the payload. o Service: This field is reserved for future use. o Length: 16 bits are used in this case for length indication of the payload in microseconds. o Header error check (HEC): Signal, service, and length fields are protected by this checksum.

Infra red: The PHY layer, which is based on infra red (IR) transmission, uses near visible light at 850950 nm.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

This allows for point-to-multipoint communication. The maximum range is about 10 m if no sunlight or heat sources interfere with the transmission. Typically, such a network will only work in buildings, e.g., classrooms, meeting rooms etc.

IEEE 802.11 Media Access Control (MAC) Layer: The MAC layer has to control medium access, but it can also offer support for roaming, authentication, and power conservation. The basic services provided by the MAC layer are o the mandatory asynchronous data service and o An optional time-bounded service In ad-hoc network mode only offers the asynchronous service and an infrastructure-based network offers both service (asynchronous data service and time-bounded service). The asynchronous service supports broadcast and multi-cast packets, and packet exchange is based on a best effort model, i.e., no delay bounds can be given for transmission. Access Methods: The three basic access mechanisms have been defined for IEEE 802.11 o DCF CSMA / CA ( Mandatory) Based on the version of CSMA/CA o DCD with RTS/CTS (Optional) Avoid the hidden terminal problem. o PCF (Optional) Access point survey terminals according the list. The first two methods are also summarized as distributed coordination function (DCF), the third method is called point coordination function (PCF). DCF only offers asynchronous service, but PCF offers both asynchronous and timebounded service. The MAC mechanisms are also called distributed foundation wireless medium access control (DFWMAC). Priorities: The below figure shows the three different parameters that define the priorities of medium access.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

10

Short inter-frame spacing (SIFS): The shortest waiting time for medium access (so the highest priority) is defined for short control messages. DCF inter-frame spacing (DIFS): This parameter denotes the longest waiting time and has the lowest priority for medium access. PCF inter-frame spacing (PIFS): A waiting time between DIFS and SIFS (and thus a medium priority) is used for a time-bounded service. Basic DFWMAC-DCF using CSMA / CA: CSMA/CA Principles: Station ready to send, starts sensing the medium (Carrier Sense based on CCA, Clear Channel Assessment). If the medium is free for the duration of an Inter-Frame Space (IFS), the station can start sending. If the medium is busy, the station has to wait for a free IFS, and then the station must additionally wait a random back-off time (collision avoidance, multiple of slot-time). If another station occupies the medium during the back-off time of the station, the backoff timer stops.

CSMA/CA broadcast: The below figure explains, five stations trying to send a packet at the marked points in time. Station3 has the first request from a higher layer to send a packet. The station senses the medium, waits for DIFS and accesses the medium, i.e., sends the packet. Station1, station2, and station5 have to wait at least until the medium is idle for DIFS again after station3 has stopped sending.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

11

Now all three stations choose a backoff time within the contention window and start counting down their backoff timers. The backoff time of station1 as sum of boe (the elapsed backoff time) and bor (the residual backoff time). The same is shown for station5. Station2 has a total backoff time of only boe and gets access to the medium first. Now the backoff timers of station1 and station5 stop, and the stations store their residual backoff times. While a new station has to choose its backoff time from the whole contention window, the two old stations have statistically smaller backoff values. Now station4 wants to send a packet as well, so after DIFS waiting time, three stations try to get access. The two stations accidentally have the same backoff time This results in a collision on the medium as shown, i.e., the transmitted frames are destroyed. Station1 stores its residual backoff time again. In the last cycle shown station1 finally gets access to the medium, while station4 and station5 have to wait.

CSMA/CA unicast: Sending unicast packets o station has to wait for DIFS before sending data o receiver acknowledges at once (after waiting for SIFS) if the packet was received correctly (CRC) o automatic retransmission of data packets in case of transmission errors

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

12

DFWMAC-DCF with RTS/CTS extension: Sending unicast packets Station can send RTS with reservation parameter after waiting for DIFS (reservation determines amount of time the data packet needs the medium) After receiving the RTS, the sender sends the CTS to the sender after SIFS. Now the sender is ready to transmit the data. (After receiving the CTS) Now the sender can transmit the data after SIFS. After receiving the data, the receiver sends the ACK after SIFS. other stations store medium reservations distributed via RTS and CTS

DFWMAC-PCF with polling: The two access mechanisms presented so far cannot guarantee a maximum access delay or minimum transmission bandwidth. To provide a time-bounded service, the standard specifies a point coordination function (PCF) on top of the standard DCF mechanisms. Using PCF requires an access point that controls medium access and polls the single nodes The point co-ordinator in the access point splits the access time into super frame periods as shown in the figure.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

13

A super frame comprises a contention free period and a contention period. The contention period can be used for the two access mechanisms presented above. The figure also shows several wireless stations (all on the same line) and the stations NAV (again on one line).

IEEE 802.11 MAC Frame: The general format is used for all data and control frames, but not all fields are used in all contexts.

The Data fields are as follows: o Frame Control: Indicates the type of frame and provides control information. o Duration/Connection ID: If used as a duration field, indicates the time. If use connection ID, indicates the connection.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

14

o Addresses: The 48-bit address fields depend on context. The transmitter address and receiver address are joined to the BSS that are transmitting and receiving frames over the wireless LAN. o Sequence Control: A 4-bit fragment number subfield used for fragmentation and reassembly, and a 12-bit sequence number used to number frames sent between a given transmitter and receiver. o Frame Body: Contains an MSDU or a fragment of an MSDU. The MSDU is a LLC protocol data unit or MAC control information. o Frame Check Sequence: A 32-bit cyclic redundancy check. The frame control field consists of the following fields:

o o o o o o o o o o o

Protocol Version: 802.11 version, which version currently used. Type: Identifies the frame as control, management, or data. Subtype: Further identifies the function of frame. To DS: The MAC coordination sets this bit to 1 in a frame destined to the distribution system. From DS: The MAC coordination sets this bit to 1 in a frame leaving the distribution system. More Fragments: Set to 1 if more fragments follow this one. Retry: Set to 1 if this is a retransmission of a previous frame. Power Management: Set to 1 if the transmitting station is in a sleep mode. More Data: Indicates that a station has additional data to send. WEP: WEP is used in the exchange of encryption keys for secure data exchange. Order: Set to 1 in any data frame sent using the Strictly Ordered service, which tells the receiving station that frames must be processed in order.

Control frame subtypes: Power Save-Poll (PS-Poll) Request to Send (RTS) Clear to Send (CTS) Acknowledgment Contention-Free (CF)-End CF-End + CF-Ack

Data frame subtypes:

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

15

Data Data + CF-Ack Data + CF-Poll Data + CF-Ack + CF-Poll

Management frame subtypes: Used to communicate between station and AP. Association Request Association Response Reassociation Request Reassociation Response Probe Request Probe Response Beacon Announcement Traffic Indication Message Dissociation Authentication Deauthentication

IEEE 802.11 Services IEEE 802.11 defines nine services that need to be provided by the wireless LAN to provide functionality equivalent to that which is inbuilt to wired LANs. The Services are

The above list of services are categorized in to two types: o Station: Stations are implemented in every 802.11 station, including access point (AP) stations. o Distribution system: Distribution services are provided between basic service sets (BSSs); these services may be implemented in an AP or in another special purpose device attached to the distribution system. In the above list
IT2402 Mobile Communication Year-IV Semester-VII UNIT 2 (Wireless Network)

16

o Three of the services are used to control IEEE 802.11 LAN access and confidentiality. o Six of the services are used to support delivery of MAC service data units (MSDUs) between stations. o The MSDU is the block of data passed down from the MAC user to the MAC layer; typically this is a LLC PDU. o If the MSDU is too large to be transmitted in a single MAC frame, it may be fragmented and transmitted in a series of MAC frames. Distribution of Messages within a DS: The two services involved with the distribution of messages within a DS are o Distribution o Integration. Distribution is the primary service used by stations to exchange MAC frames when the frame must cross the DS to get from a station in one BSS to a station in another BSS. For example,

Suppose a frame is to be sent from station 2 (STA 2) to STA 7 in the above figure. The frame is sent from STA 2 to STA 1, which is the AP for this BSS. The AP gives the frame to the DS, which has the job of directing the frame to the AP associated with STA 5 in the target BSS. STA 5 receives the frame and forwards it to STA 7. If the two stations that are communicating are within the same BSS, then the distribution service logically goes through the single AP of that BSS
The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

17

The term integrated refers to a wired LAN that is physically connected to the DS The integration service takes care of any address translation and media conversion logic required for the exchange of data.

Association related Services


The main purpose of the MAC layer is to transfer MSDUs between MAC entities; this purpose is fulfilled by the distribution service. The Distributed services required a information about the stations from the ESS, which is provided by the association-related services. Before the distribution service can deliver data to or accept data from a station, that station must be associated. The three services are related to this requirements: Association: o Establishes an initial association between a station and an AP. o Before a station can transmit or receive frames on a wireless LAN, its identity and address must be known. o For this purpose, a station must establish an association with an AP within a particular BSS. o The AP can then communicate this information to other APs within the ESS to facilitate routing and delivery of addressed frames. Reassociation: o Enables an established association to be transferred from one AP to another, allowing a mobile station to move from one BSS to another. Disassociation: o A notification from either a station or an AP that an existing association is terminated.

Access and Privacy Services


In order to transmit over a wired LAN, a station must be physically connected to the LAN. On the other hand, with a wireless LAN, any station within radio range of the other devices on the LAN can transmit. Similarly, in order to receive a transmission from a station that is part of a wired LAN, the receiving station must also be attached to the wired LAN. On the other hand, with a wireless LAN, any station within radio range can receive. Thus, a wired LAN provides a degree of privacy, limiting reception of data to stations connected to the LAN. Wireless LAN provide three services: o Authentication: Used to establish the identity of stations to each other. o Deauthentication: This service is invoked whenever an existing authentication is to be terminated. o Privacy: Used to stop the contents of messages from being read by other than the intended recipient.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

18

WIMAX AND IEEE 802.16 BROADBAND WIRELESS ACCESS STANDARDS


In 1999, IEEE 802 committee introduces an 802.16 working group for broadband wireless standard. WIMAX is a industry group (World-wide Interoperability Microwave Access). This WIMAX Forum, has been formed to promote the 802.16 standards and to develop interoperability specifications. The charter for the group is to develop standards that o Use wireless links with microwave or millimeter wave radios o Normally use licensed spectrum o Are metropolitan in scale o Provide public network service to fee-paying customers o Use point-to-multipoint architecture with stationary rooftop or tower-mounted antennas o Are capable of broadband transmissions (>2 Mbps) IEEE 802.16 Standards:

IEEE 802.16 Architecture: System Reference Architecture:


The 802.16 standards are designed with respect to the abstract system reference model shown in the below figure. An 802.16 wireless service provides a communications path between a subscriber site and core network. The subscribers site may be either a single subscriber device or a network on the subscriber's premises (e.g., a LAN, IP-based network). The core network is the public telephone network and the Internet.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

19

Two interfaces are defined in this service. Air interface between the subscriber's transceiver station and the base transceiver station. The system reference model also shows interfaces between the transceiver stations and the networks behind them (SNI and BNI). This layer working from the bottom up.

Protocol Architecture:
Protocols defined specifically for wireless transmission address issues relating to the transmission of blocks of data over the network. IEEE 802.16 protocols are concerned with lowest two layers of the OSI model. The below figure shows the four protocol layers defined in the 802.16 protocol architecture to the OSI model.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

20

The lowest two layers (Transmission and Physical) of the 802.16 protocol model correspond to the physical layer of the OSI model and include such functions as o Encoding/decoding of signals o Preamble generation/removal (for synchronization) o Bit transmission/reception In addition, the physical layer of the 802 model includes a specification of the transmission medium and the frequency band. Medium Access Control layer include such functions o On transmission, assemble data into a frame with address and error detection fields.
o On reception, disassemble frame, and perform address recognition and error detection.

o Govern access to the wireless transmission medium. The protocol at this layer, between the base station and the subscriber station, is responsible for sharing access to the radio channel. Specifically, the MAC protocol defines how and when a base station or subscriber station may initiate transmission on the channel. A convergence layer protocol may do the following functions: o Encapsulate PDU (protocol data unit) framing of upper layers into 802.16 MAC/PHY frames. o Map an upper layer's addresses into 802.16 addresses. o Translate upper layer QoS parameters into native 802.16 MAC format. o Equalize the upper layer time into MAC services.

IEEE 802.16 Services:


IEEE 802.16 is designed to support the following bearer services: o Digital audio/video multicast: Transports one-way digital audio/video streams to subscribers. The principal example of this service is a broadcast radio and video similar to digital broadcast cable TV and digital satellite TV. A special case of this service is two-way video such as in teleconferencing. o Digital telephony: Supports multiplexed digital telephony streams. This service is a classic WLL service that provides a replacement for wired access to the public telephone network. o ATM: Provides a communications link that supports the transfer of ATM cells as part of an overall ATM network. o Internet protocol: Supports the transfer of IP datagrams. The 802.16 link must provide efficient timely service. o Bridged LAN: Similar to the IP-based support. A bridge LAN service enables transfer of data between two LANs with switching at the MAC layer. o Back-haul: For cellular or digital wireless telephone networks. o Frame relay: Similar to ATM. Frame relay uses variable-length frames in contrast to the fixed-length cells of ATM.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

21

The above bearer services are grouped in three broad categories: o Circuit based: These services provide a circuit-switching capability, in which connections are set up to subscribers across a core network. o Variable packet: IP and frame transmit are examples of services that make use of variable-length PDUs. Another example is MPEG video, which is a video compression scheme in which successive blocks of digital video information may be of varying sizes. o Fixed-length celUpacket: This service is for ATM.

IEEE 802.16 MAC Layer:


Data transmitted over the 802.16 air interface from or to a given subscriber are structured as a sequence of MAC frames. The MAC frame includes o MAC protocol control information and o higher-level data. This is not to be confused with a TDMA frame, which consists of a sequence of time slots, each dedicated to a given subscriber. A TDMA time slot may contain exactly one MAC frame, a fraction of a MAC frame, or multiple MAC frames. The sequence of time slots across multiple TDMA frames that is dedicated to one subscriber forms a logical channel, and MAC frames are transmitted over that logical channel. Connection-oriented o All services inherently connectionless mapped to a connection Connections referenced using a 16-bit connection identifier (CID) Management channels and transport channels for contracted services

IEEE 802.16 Frame Format


The MAC frame consists of three sections: o Header: Contains protocol control information needed for the functioning of the MAC protocol. o Payload: The payload may be either higher-level data (e.g., an ATM cell, an IP packet, a block of digital speech) or a MAC control message. o CRC: The cyclic redundancy check field contains an error-detecting code

Three header formats are defined. o There is a generic header format in both the uplink (toward the base station) and downlink (toward the subscriber) directions. These formats are used for frames that contain either higher-level data or a MAC control message. o The third format is used for a bandwidth request frame.
IT2402 Mobile Communication Year-IV Semester-VII UNIT 2 (Wireless Network)

22

The downlink header format is shown in the below figure.

The downlink header consists of the following fields: o Encryption control (1 bit): Indicates whether the payload is encrypted. o Encryption key sequence (4 bits): An index into a vector of encryption key information, to be used if the payload is encrypted. o Length (11 bits): Length in bytes of the entire MAC frame. o Connection identifier (16 bits): A unidirectional, MAC-layer address that identifies a connection to equivalent peers in the subscriber and base station MAC. o Header type (1 bit): Indicates whether this is a generic or bandwidth request header. o ARQ indicator (1 bit): Indicates whether the frame belongs to an ARQ (Automatic Repeat Request) enabled connection. o Fragment control (2 bits): Used in fragmentation and reassembly, as explained subsequently. o Fragment sequence number (4 bits): Sequence number of the current fragment. o Header check sequence (8 bits): An 8-bit CRC used to detect errors in the header. The uplink header format is shown in the below figure.

The uplink header consists of the following fields. o It contains all of the fields of the downlink header, plus an 8-bit grant management field. o Grant Management field (8 bit): This field is used by the subscriber to convey bandwidth management needs to the base station. o There are three different encodings of this field, depending on the type of connection. The subfields within the GM field include Slip indicator (1 bit): If set, indicates a slip of uplink grants relative to the uplink queue depth.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

23

Poll-me (1 bit): If set requests a poll by the base station. Grants per interval (7 bits): The number of grants required by a connection. Piggyback request (8 bits): The number of bytes of uplink capacity requested by the subscriber for this connection.

Finally, the bandwidth request header o is used by the subscriber to request additional bandwidth. This header is for a MAC frame with no payload.

IEEE 802.16 Physical Layer:


The 802.16 physical layer supports a different structure for o the point-to multipoint downstream channels and o the multipoint-to-point upstream channels Upstream channel o Stations transmit in their assigned allocation specified in an initial map o Uplink sub-frame may also contain contention-based allocations for initial system access o Uses a DAMA-TDMA technique o Error correction uses Reed-Solomon codes Downstream channel o Continuous downstream mode For continuous transmission (audio/video) Simple TDM scheme is used for channel access Frequency division duplex (FDD) o Burst downstream mode For bursty transmission (IP-based traffic) DAMA-TDMA scheme for channel access FDD with adaptive modulation, frequency shift division duplexing (FSDD), time division duplexing (TDD)

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

24

MOBILE AD HOC NETWORKS


Mobility support joins on the existence of at least some infrastructure. o Mobile IP requires, e.g., a home agent, tunnels, and default routers. o DHCP requires servers and broadcast capabilities of the medium reaching all participants or relays to servers. o Cellular phone networks require base stations, infrastructure networks, etc. However, there may be several situations, users of a network cannot rely on an infrastructure, it is too expensive, or there is none at all. In this situation mobile ad-hoc networks are the only choice. Features of ad hoc Network o Instant infrastructure: Infrastructures need planning and administration. It would take too long to set up this kind of infrastructure; therefore, ad-hoc connectivity has to set up. o Disaster relief: Cyclone cut phone and power lines, floods destroy base stations, fires burn servers. But, the above things are not suffered in the ad-hoc Network. Emergency teams can only rely on an infrastructure they can set up themselves. No forward planning can be done, and the set-up must be extremely fast and reliable. o Remote areas: Even if infrastructures could be planned ahead, it is sometimes too expensive to setup infrastructure in sparsely populated areas. But it is possible in ad-hoc network. o Effectiveness: Registration procedures might take too long, and communication overheads might be too high with existing networks. Application-tailored ad-hoc networks can offer a better solution.

Fig: MANETs and mobile IP

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

25

Over the last few years ad-hoc networking has attracted a lot of research interest. This has led to creation of a working group at the IETF that is focusing on Mobile ad-hoc networking (MANET). The above figure shows the relation of MANET to Mobile IP and DHCP. While mobile IP and DHCP handle the connection of mobile devices to a fixed infrastructure, MANET comprises mobile routers, too. Mobile devices can be connected with an infrastructure using Mobile IP for mobility support and DHCP as a source of many parameters, such as an IP address. MANET research is responsible for developing protocols and components to enable adhoc networking between mobile devices. A variant of distance vector routing was used in this ad-hoc network. In this approach, each node sends a routing advertisement. These advertisements contain a neighbor table with a list of link qualities to each neighbor. Each node updates the local routing table according to the distance vector algorithm based on these advertisements. Received packets also help to update the routing table.

Routing In wireless networks with infrastructure support a base station always reaches all mobile nodes, this is not always the case in an ad-hoc network. A destination node might be out of range of a source node transmitting packets. Routing is needed to find a path between source and destination and to forward the packets appropriately. In wireless networks using an infrastructure, cells have been defined. Within a cell, the base station can reach all mobile nodes without routing via a broadcast. In the case of adhoc networks, each node must be able to forward data for other nodes. The below figure gives a simple example of an ad-hoc network.

At a certain time t1 the network topology might look as illustrated on the left side of the figure. Five nodes, N1 to N5, are connected depending on the current transmission characteristics between them. In this snapshot of the network, N4 can receive N1 over a good link, but N1 receives N4 only via a weak link.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

26

Links do not necessarily have the same characteristics in both directions. The reasons for this are, e.g., different antenna characteristics or transmit power. N1 cannot receive N2 at all, N2 receives a signal from N1. This creates many additional problems that are discussed in the following paragraphs. Asymmetric links: o Node A receives a signal from node B. But this does not tell us anything about the quality of the connection in reverse. o Node B might receive nothing, have a weak link, or even have a better link than the reverse direction. Routing information collected for one direction is of almost no use for the other direction. Redundant links: o In ad-hoc networks nobody controls redundancy, so there might be many redundant links up to the extreme of a completely meshed topology. o Routing algorithms for wired networks can handle redundancy, but a high redundancy can cause a large computational overhead for routing table updates. Interference: o Links come and go depending on transmission characteristics, one transmission might interfere with another, and nodes might overhear the transmissions of other nodes. o Interference creates new problems by unplanned links between nodes: if two close-by nodes forward transmissions, they might interfere and destroy each other, interference might also help routing. Dynamic topology: o The mobile nodes might move or medium characteristics might change. These results in frequent changes in topology, so snapshots are valid only for a very short period of time. o In ad-hoc networks, routing tables must somehow reflect these frequent changes in topology, and routing algorithms have to be adapted. Routing algorithms used in wired networks would either react much too slowly or generate many updates to reflect all changes in topology. Considering all the additional difficulties in comparison to wired networks, the following observations concerning routing can be made for ad-hoc networks with moving nodes. Traditional routing algorithms known from wired networks will not work efficiently. Routing in wireless ad-hoc networks cannot rely on layer three knowledge alone. Centralized approaches will not really work, because it takes too long to collect the current status and circulate it again. Within this time the topology has already changed. Many nodes need routing capabilities. The concept of a connection with certain characteristics cannot work properly. A last alternative to forward a packet across an unknown topology is known as flooding.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

27

Destination Sequence Distance Vector (DSDV) Destination sequence distance vector (DSDV) routing is an improvement to distance vector routing for ad-hoc networks. Distance vector routing is used as routing information protocol (RIP) in wired networks. It performs extremely poorly (very poor) with certain network changes due to the countto- infinity problem. DSDV now adds two things to the distance vector algorithm: Sequence numbers: Each routing advertisement comes with a sequence number. Sequence numbers help to apply the advertisements in correct order. This avoids the loops that are likely with the unchanged distance vector algorithm. Damping: Transient changes in topology that are of short duration should not destabilize the routing mechanisms. Advertisements containing changes in the topology currently stored as therefore not disseminated further. A node waits with dissemination if these changes are probably unstable.

Dynamic source routing In ad-hoc network, nodes are transmitting the packets from time to time and Destination sequence distance vector (DSDV) is used for updating the routing tables. Although only some user data has to be transmitted, the nodes exchange routing information to keep track of the topology. These algorithms maintain routes between all nodes, although there may currently be no data exchange at all. This causes unnecessary traffic and prevents nodes from saving battery power. Dynamic source routing (DSR), therefore, divides the task of routing into two separate problems. Route discovery: A node only tries to discover (find out) a route to a destination if it has to send something to this destination and there is currently no known route. Route maintenance: If a node is continuously sending packets via a route, it has to make sure that the route is held upright. As soon as a node detects problems with the current route, it has to find an alternative. If a node needs to discover a route, it broadcasts a route request with a unique identifier and the destination address as parameters. Any node that receives a route request does the following: If the node has already received the request, it drops the request packet.
If the node recognizes its own address as the destination, the request has reached its target.

Otherwise, the node appends its own address to a list of traversed hops in the packet and broadcasts this updated route request.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

28

Example: The below figure, find the route between N1 and N3

o N1 broadcasts the request ((N1), id = 42, target = N3), N2 and N4 receive this request. o N2 then broadcasts ((N1, N2), id = 42, target = N3), N4 broadcasts ((N1, N4), id = 42, target = N3). N3 and N5 receive N2s broadcast, N1, N2, and N5 receive N4s broadcast. o N3 recognizes itself as target, N5 broadcasts ((N1, N2, N5), id = 42, target = N3). N3 and N4 receive N5s broadcast. N1, N2, and N5 drop N4s broadcast packet, because they all recognize an already received route request. o N4 drops N5s broadcast, N3 recognizes (N1, N2, N5) as an alternate, but longer route. o N3 now has to return the path (N1, N2, N3) to N1. This is simple assuming symmetric links working in both directions. N3 can forward the information using the list in reverse order. The assumption of bi-directional links holds for many ad-hoc networks. However, if links are not bi-directional, the scenario gets more complicated. The algorithm has to be applied again, in the reverse direction if the target does not maintain a current path to the source of the route request. o N3 has to broadcast a route request ((N3), id = 17, target = N1). Only N5 receives this request. o N5 now broadcasts ((N3, N5), id = 17, target = N1), N3 and N4 receive the broadcast. o N3 drops the request because it recognizes an already known id. N4 broadcasts ((N3, N5, N4), id = 17, target = N1), N5, N2, and N1 receive the broadcast. o N5 drops the request packet, N1 recognizes itself as target, and N2 broadcasts ((N3, N5, N4, N2), id = 17, target = N1). N3 and N5 receive N2s broadcast. o N3 and N5 drop the request packet. Now N3 holds the list for a path from N1 to N3, (N1, N2, N3), and N1 knows the path from N3 to N1, (N3, N5, N4, N1). But N1 still does not know how to send data to N3! The only solution is to send the list (N1, N2, N3) with the broadcasts initiated by N3 in the reverse direction.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

29

Alternative metrics Even for fixed networks, example bandwidth can also be a factor for the routing metric. Due to the varying link quality and the fact that different transmissions can interfere, other metrices can be more useful. One other metric, called least interference routing (LIR), takes possible interference into account. The below figure shows an ad-hoc network topology.

With both transmissions taking place simultaneously, there would have been interference between them. In this case, least interference routing helped to avoid interference. Taking only local decisions and not knowing what paths other transmissions take, this scheme can just lower the probability of interference. Routing can take several metrices into account at the same time and weigh them. Metrices could be the number of hops h, interference i, reliability r, error rate e, etc. The cost of a path could then be determined as: Cost = h + i + r + e + It is not at all easy to choose the weights , , , , to achieve the desired routing behavior.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

30

WIRELESS LOCAL LOOP (WLL)


Introduction: Traditionally, the provision of voice and data communications to the end user, over the local loop, or subscriber loop, has been provided by wired systems. The residential subscribers, twisted pair has been and continues to be the standard means of connection. For business and government subscribers, twisted pair, coaxial cable, and optical fiber are in use. As subscribers have demanded greater capacity, particularly to support Internet use, traditional twisted pair technology has become inadequate. Telecommunications providers have developed a number of technologies to meet the need, including ISDN (integrated services digital network). In addition, cable operators have introduced two-way highspeed service using cable modem technology. Thus, wired technologies are responding to the need for reliable, high-speed access by residential, business, and government subscribers. However, increasing interest is being shown in competing wireless technologies for subscriber access. These approaches are generally referred to as wireless local loop (WLL), or fixed wireless access. WLL alternatives are narrowband, which offer a replacement for existing telephony services, and broadband, which provide high-speed two-way voice and data service.

The Role of WLL


The below figure illustrates a simple WLL configuration. A WLL provider services one or more cells. Each cell includes a base station antenna, mounted on top of a tall building or tower. Individual subscribers have a fixed antenna mounted on a building or pole that has an unobstructed line of sight to the base station antenna. From the base station, there is a link, which may either be wired or wireless, to a switching center. The switching center is typically a telephone company local office, which provides connections to the local and long-distance telephone networks. An Internet service provider (ISP) may be collocated at the switch or connected to the switch by a high-speed link. The below figure shows the WLL configuration. The WLL has a number of advantages over a wired approach to subscriber loop support: o Cost: Wireless systems are less expensive than wired systems. Although the electronics of the wireless transmitter/receiver may be more expensive than those used for wired communications, with WLL the cost of installing kilometers of cable, either underground or on poles, is avoided, as well as the cost of maintaining the wired infrastructure. o Installation time: WLL system can be installed in a small fraction of the time required for a new wired system. o Selective installation: Radio units are installed only for those subscribers who want the service at a given time.
IT2402 Mobile Communication Year-IV Semester-VII UNIT 2 (Wireless Network)

31

WLL needs to be evaluated with respect to two alternatives: o Wired scheme using existing installed cable: WLL has become cost-competitive with wired schemes; new installations face a genuine choice between the wired and wireless approaches. o Mobile cellular technology: A major advantage of WLL over mobile cellular is that, because the subscriber unit is fixed, the subscriber can use a directional antenna pointed at the base station antenna, providing improved signal quality in both directions. In the United States, the Federal Communications Commission (FCC) has set aside 15 frequency bands for use in commercial fixed wireless service, at frequencies 2 to 40 GHz. Two approaches of most interest for the WLL application are: o Local multipoint distribution service (LMDS) and o Multichannel multipoint distribution service (MMDS). Multichannel Multipoint Distribution Service: (MMDS) The below table shows five frequency bands in the range 2.15 GHz to 2.68 GHz that have been allocated in the United States for fixed wireless access using MMDS. The first two bands were licensed in the 1970s when they were called multipoint distributions services (MDSs), for broadcast of 6 MHz TV channels. In 1996, the FCC increased the allocation to its present range and allowed for multichannel services, called MMDS. MMDS has been used to struggle with cable TV providers and to provide service in rural areas not reached by broadcast TV or cable. For this reason, MMDS is also referred to as wireless cable. The transmitted power allowed by the FCC enables an MMDS base station to service an area with a radius of 50 km, but subscriber antennas must be in the line of sight. MMDS can be used to support two-way services. MMDS is also used in other countries for two-way access. Thus, MMDS is an alternative for broadband data services, such as Internet access. The Disadvantage of MMDS, compared to LMDS. MMDS is offers much less bandwidth than LMDS. With current technology, a single MMDS channel can offer upstream transfer rates of 27 Mbps, with individual subscriber rates of 300 kbps to 3 Mbps.
IT2402 Mobile Communication Year-IV Semester-VII UNIT 2 (Wireless Network)

32

The advantages of MMDS over LMDS include the following: MMDS signals have larger wavelengths (greater than 10 cm) and can travel farther without losing significant power. Equipment at lower frequencies is less expensive, yielding cost savings at both the subscriber and base station. MMDS signals don't get blocked as easily by objects and are less susceptible to rain absorption. Local Multipoint Distribution Service: (LMDS) LMDS is a relatively new WLL service to deliver TV signals and two-way broadband communications, operating at millimeter frequencies. In the United States, LMDS will be offered at frequencies near 30 GHz; in Europe and some other areas, frequencies near 40 GHz will be used. . LMDS has the following advantages: Relatively high data rates, in the Mbps range Capable of providing video, telephony, and data Relatively low cost in comparison with cable alternatives

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

33

The principal disadvantage of LMDS The short range from the base station, requiring a relatively large number of base stations to service a given area. In a typical system, the base station antenna is located on top of a tall building or high pole overlooking the service area, with line of sight to subscribers with the possible exception of tree canopies. The base station antenna covers a sector 60 to 90 wide. Thus, full coverage requires 4 to 6 antennas.

Propagation Considerations for WLL:


For most high-speed WLL schemes, frequencies are referred to as the millimeter wave region are used. Although the term millimeter wave is not precisely defined, a common boundary is 10 GHz. The reasons for using frequencies in this range for WLL include the following: o There are wide unused frequency bands available above 25 GHz. o At these high frequencies, wide channel bandwidths can be used, providing high data rates. o Small size transceivers and adaptive antenna arrays can be used. However, millimeter wave systems have some unwanted propagation (spread) characteristics: o Free space loss increases with the square of the frequency. o Generally, below 10 GHz, we can ignore attenuation due to rainfall and atmospheric or gaseous absorption. Above 10 GHz, these attenuation effects are large. o Multipath losses can be quite high. Because of these negative propagation characteristics, WLL systems can only serve cells of a limited radius, usually just a few kilometers. Finally, rainfall and humidity effects limit the range and availability of WLL systems. Fresnel Zone: o For effective communication at millimeter wavelengths, there should be an unobstructed line of sight between transmitter and receiver. o The definition of Fresnel zones is, any small element of space in the path of an electromagnetic wave may be considered the source of secondary wavelet, and that the radiated field can be built up by the superposition of all these wavelets. o It can be shown that objects lying within a series of concentric circles around the direct line of sight between two transceivers have constructive or destructive effects on communication. o Those that fall within the first circle, the first Fresnel zone, have the most serious negative effects. o Consider a point along the direct path between a transmitter and receiver, that is, a distance S from the transmitter and a distance D from the receiver, with the total

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

34

distance along the path equal to S + D (The below figure show)

o Then the radius of the first Fresnel zone at that point is

where R, S, D, and are in the same units, and A is the wavelength of the signal along the path. where R is expressed in meters, the two distances are in kilometers, and the signal frequency is in gigahertz. Atmospheric Absorption o At frequencies above 10 GHz, radio waves propagating through the atmosphere are subject to molecular absorption. The absorption as a function of frequency is very uneven. o There is a peak of water vapor absorption at around 22 GHz and a peak of oxygen absorption near 60 GHz. Effect of Rain o One of the most serious concerns for millimeter wave propagation is attenuation due to rain. The presence of raindrops can severely degrade the reliability and performance of communication links. o The effect of rain on millimeter wave propagation is complex, depending on drop shape, drop size, rain rate, and frequency. Effects of Vegetation o Through part of its path, a WLL link may run through vegetation, particularly foliage of tall trees. In some suburban and small town areas, such obstacles may be unavoidable for some subscribers, even with rooftop subscriber antennas. o A study reported in reached the following conclusions: The presence of trees near subscriber sites can lead to multipath fading. The principal multipath effects from the tree canopy are diffraction and scattering. Measurements in regularly planted orchards have found attenuation values between 12 and 20 dB. The multipath effects are highly variable due to wind.

IT2402 Mobile Communication

Year-IV

Semester-VII

UNIT 2 (Wireless Network)

S-ar putea să vă placă și