Documente Academic
Documente Profesional
Documente Cultură
Characteristics
HIPERLAN
IEEE 802.11
Bluetooth / IEEE
PHY
802.15.x
MAC
IEEE
Roaming
.11a, b, g, h, i …
802.16/.20/.21/.22
RFID
Comparison
1
Wireless LAN Components
The WLAN has the following configuration:
Access Point :
Connects to the wired network from a fixed location via an
Ethernet cable
Receives, transmits information from mobile devices such as
laptops, PDAs etc and the wired infrastructure network.
A single access point can function anywhere in the range of 30
metres to several hundred feet.
WLAN Adapters:
The mobile devices communicate with the operating system via
the WLAN Adapters(radio Network Interface Cards NIC), ISA or
PCA adapters for desk top computers.
2
Software and HW Access Point
HW Access Point
3
SW Access Point - Advantages
4
Range of Access Point
Typical indoor ranges are 150-300 feet, but
can be shorter if the building construction
interferes with radio transmissions. Longer
ranges are possible, but performance will
degrade with distance.
Outdoor ranges are quoted up to 1000 feet,
but again this depends upon the environment.
There are ways to extend the basic operating
range of Wireless communications, by using
more than a single access point or using a
wireless relay /extension point
5
No. of users on an Access Point
7
Extension Point
8
Roaming
9
Roaming
A wireless computer can "roam" from one access point
to another, with the software and hardware
maintaining a steady network connection by
monitoring the signal strength from in-range access
points and locking on to the one with the best quality.
Usually this is completely transparent to the user; they
are not aware that a different access point is being
used from area to area. Some access point
configurations require security authentication when
swapping access points, usually in the form of a
password dialog box.
Access points are required to have overlapping
wireless areas to achieve this
*** NOT ALL ACCESS POINTS SUPPORT ROAMING
10
LAN to LAN Wireless Communication
11
Mobile Communication
Technology according to IEEE
WiFi
802.11a 802.11h
Local wireless 802.11i/e/…/w
networks 802.11b 802.11g
WLAN 802.11
ZigBee
802.15.4 802.15.4a/b
802.15.5
802.15.2 802.15.3 802.15.3a/b
802.15.1
Bluetooth
WiMAX
+ Mobility
802.20 (Mobile Broadband Wireless Access) 12
Characteristics of wireless LANs
Advantages
very flexible within the reception area
Ad-hoc networks without previous planning possible
(almost) no wiring difficulties (e.g. historic buildings, firewalls)
more robust against disasters like, e.g., earthquakes, fire - or
users pulling a plug...
Disadvantages
typically very low bandwidth compared to wired networks
(1-10 Mbit/s) due to shared medium
many proprietary solutions, especially for higher bit-rates,
standards take their time (e.g. IEEE 802.11)
products have to follow many national restrictions if working
wireless, it takes a vary long time to establish global solutions
like, e.g., IMT-2000
13
Design goals for wireless LANs
global, seamless operation
low power for battery use
no special permissions or licenses needed to use the LAN
robust transmission technology
simplified spontaneous cooperation at meetings
easy to use for everyone, simple management
protection of investment in wired networks
security (no one should be able to read my data), privacy (no
one should be able to collect user profiles), safety (low
radiation)
transparency concerning applications and higher layer
protocols, but also location awareness if necessary
14
Comparison: infrared vs. radio
transmission
Infrared
uses IR diodes, diffuse light, multiple reflections (walls,
furniture etc.). Photo diodes act as receivers.
Advantages
simple, cheap, available in many mobile devices
no licenses needed
simple shielding possible
Disadvantages
interference by sunlight, heat sources etc.
many things shield or absorb IR light
low bandwidth
Example
IrDA (Infrared Data Association) interface available
everywhere
15
Paper : An Adhoc Network system based on Infra Red
Communication
16
Comparison: infrared vs. radio
transmission
Radio
typically using the license free ISM band at 2.4 GHz
Advantages
experience from wireless WAN and mobile phones can be
used
coverage of larger areas possible (radio can penetrate walls,
furniture etc.)
Disadvantages
very limited license free frequency bands
shielding more difficult, interference with other electrical
devices
Example
Many different products
17
Comparison: infrastructure vs. ad-
hoc networks
Infrastructure
network
AP: Access Point
AP
AP wired network
AP
ad-hoc network
18
Comparison: infrastructure vs. ad-
hoc networks
A very good coordination is required between the
medium access of wireless nodes and access points.
Else, collisions can occur (infrastructure networks)
If the access points control the medium access of
individual terminals, collisions can be largely
minimized.
19
Complexity with Adhoc Networks
20
802.11 - Architecture of an
infrastructure network
802.11 LAN
802.x LAN Station (STA)
terminal with access mechanisms
to the wireless medium and radio
STA1 contact to the access point
BSS1
Basic Service Set (BSS)
Access Portal
group of stations using the same
Point radio frequency
Distribution System Access Point
station integrated into the wireless
Access
ESS Point LAN and the distribution system
Portal
BSS2 bridge to other (wired) networks
Distribution System
interconnection network to form
one logical network (EES:
STA2 802.11 LAN STA3 Extended Service Set) based
on several BSS
21
802.11 - Architecture of an infrastructure network
22
802.11 - Architecture of an ad-hoc network
802.11 LAN Direct communication
within a limited range
STA1
IBSS1 STA3 Station (STA):
terminal with access
mechanisms to the
STA2
wireless medium
Independent Basic
IBSS2 Service Set (IBSS):
group of stations
STA5
using the same radio
STA4 802.11 LAN frequency
23
IEEE standard 802.11
fixed
terminal
mobile terminal
infrastructure
network
access point
application application
TCP TCP
IP IP
LLC LLC LLC
802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC
802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY
24
802.11 - Layers and functions
MAC PLCP Physical Layer
Convergence Protocol
access mechanisms,
fragmentation,
clear channel
encryption assessment signal
(carrier sense)
MAC Management
PMD Physical Medium
synchronization, Dependent
roaming, MIB, power modulation, coding
management
Station Management
LLC
PHY Management
DLC
PMD
PHY Management Station Management
MIB : Management Information Base
coordination of all
25
management
802.11 – Physical Layer
Physical Layer
26
802.11 Management Layer
27
802.11 - Physical layer (classical)
3 versions: 2 radio (typ. 2.4 GHz), 1 IR
data rates 1 or 2 Mbit/s
FHSS (Frequency Hopping Spread Spectrum)
spreading, despreading, signal strength, typ. 1 Mbit/s
min. 2.5 frequency hops/s (USA), two-level GFSK modulation
DSSS (Direct Sequence Spread Spectrum)
DBPSK modulation for 1 Mbit/s (Differential Binary Phase Shift
Keying), DQPSK for 2 Mbit/s (Differential Quadrature PSK)
preamble and header of a frame is always transmitted with 1 Mbit/s,
rest of transmission 1 or 2 Mbit/s
chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker
code)
max. radiated power 1 W (USA), 100 mW (EU), min. 1mW
Infrared
850-950 nm, diffuse light, typ. 10 m range
carrier detection, energy detection, synchronization
28
FHSS PHY packet format
Synchronization
synch with 010101... pattern
80 16 12 4 16 variable bits
synchronization SFD PLW PSF HEC payload
29
DSSS PHY packet format
Synchronization
synch., gain setting, energy detection, frequency offset compensation
SFD (Start Frame Delimiter)
1111001110100000
Signal
data rate of the payload (0A: 1 Mbit/s DBPSK; 14: 2 Mbit/s DQPSK)
Service Length
future use, 00: 802.11 compliant length of the payload
HEC (Header Error Check)
protection of signal, service and length, x16+x12+x5+1
128 16 8 8 16 16 variable bits
synchronization SFD signal service length HEC payload
30
PHY : DSSS
Sync SFD signal service length HEC Payload
Payload
128 16 8 8 16 16 Variable
31
802.11 - MAC layer I – DFWMAC (Distributed Foundation Wireless
Medium Access)
Traffic services
Asynchronous Data Service (mandatory)
exchange of data packets based on “best-effort”
support of broadcast and multicast
Time-Bounded Service (optional)
implemented using PCF (Point Coordination Function)
Access methods
DFWMAC-DCF CSMA/CA (mandatory){Distributed Coordination Function}
collision avoidance via randomized „back-off“ mechanism
minimum distance between consecutive packets
ACK packet for acknowledgements (not for broadcasts)
DFWMAC-DCF w/ RTS/CTS (optional)
Distributed Foundation Wireless MAC
avoids hidden terminal problem
DFWMAC- PCF (Point Coordination Function-optional)
access point polls terminals according to a list
32
Medium Access
DIFS
DIFS
PIFS
33
Medium Access
Priorities
defined through different inter frame spaces
DIFS DIFS
PIFS
SIFS
medium busy contention next frame
t
direct access if
medium is free ≥ DIFS
34
Basic DFWMAC-DFC using CSMA/CA
Contention window
DIFS
DIFS
Medium Busy Next Frame
Slot time
• A mobile device waits for DIFS and if the medium is free after DIFS, it accesses
the medium. So, the medium is busy.
• Once the above device releases the resources in the medium, it waits for DIFS.
The contention period starts. A few devices start their random back off timer and the
countdown of the timers start.
• whichever device that completes the timer back off time first will get access to the
medium.
•As soon as the device senses that the medium is busy, it loses the chance for this
cycle and has to try after DIFS duration.
• Now, the backoff time is initialized for the rest of the devices and they start all over
again after DIFS.
35
Basic DFWMAC-DFC using CSMA/CA
36
Medium Access Priorities
37
802.11 - competing stations - simple version(for
broadcast)
boe busy
station2
busy
station3
busy medium not idle (frame, ack etc.) boe elapsed backoff time
38
802.11 - competing stations - simple version
St-3 has the first request and sends the packet. St-3 senses
the medium, waits for DIFS and accesses the medium.
Stns 1,2 & 5 have to wait for at least DIFS after Stn-3 stops
sending the data.
All three stations now start off a back off timer and start
counting down their back off timers.
Back off time = Elapsed back off time
+ residual back off time.
@@ It is to be noted that if the residual time of device-1 is more than
that of device-2, it means that device-1 had waited for a lesser time as
compared to device-2 and so, device-2 gets a priority to access the
medium.
39
802.11 - competing stations - simple version
40
802.11 - competing stations - simple version
41
802.11 - CSMA/CA access method II (for unicast)
DIFS
data
sender
SIFS
ACK
receiver
DIFS
other data
stations t
waiting time contention
42
802.11 – DFWMAC Hidden Terminal Avoidance using RTS &
CTS)
Sending unicast packets
station can send RTS with reservation parameter after waiting for DIFS (RTS specifies receiver’s
Id, amount of time needed for transmission of data and also time for ACK )
acknowledgement via CTS after SIFS by receiver (if ready to receive) (all stns receive this)
sender can now send data at once, acknowledgement via ACK
other stations store medium reservations distributed via RTS and CTS. Other stns have to set
‘Net allocation Vector(NAV)’ (contained in CTS) that specifies how long they need to wait before
trying again for transmission.
DIFS
RTS data
sender
SIFS SIFS
CTS SIFS ACK
receiver
43
Fragmentation
If frames of larger sizes are transported, any bit error will corrupt
the entire frame and so, frame errors increase.
Hence, it is advantageous to consider shorter frame lengths so
as to minimize frame errors.
44
Fragmentation
DIFS
RTS frag1 frag2
sender
SIFS SIFS SIFS
CTS SIFS ACK1 SIFS ACK2
receiver
NAV (RTS)
NAV (CTS)
NAV (frag1) DIFS
other NAV (ACK1) data
stations t
contention
45
Fragmentation
The receiver will receive frag1 and send an ACK1 that contains duration
of the net fragment transmission.
The other set of nodes will adjust their NAV
Thus, the current fragments would contain info about the following ones.
46
DFWMAC-PCF I
t0 t1
SuperFrame
47
DFWMAC-PCF I (Point Coordination Function -Polling)
48
DFWMAC-PCF I (Point Coordination Function -Polling)
49
DFWMAC-PCF II
t2 t3 t4
PIFS SIFS
D3 D4 CFend
point
coordinator SIFS
U4
wireless
stations
stations‘ NAV
NAV contention free period contention t
period
50
802.11 - Frame format
Types
control frames, management frames, data frames
Sequence numbers
important against duplicated frames due to lost ACKs
Addresses
receiver, transmitter (physical), BSS identifier, sender (logical)
Miscellaneous
sending time, checksum, frame control, data
bytes 2 2 6 6 6 2 6 0-2312 4
Frame Duration/ Address Address Address Sequence Address
Data CRC
Control ID 1 2 3 Control 4
bits 2 2 4 1 1 1 1 1 1 1 1
Protocol To From More Power More
Type Subtype Retry WEP Order
version DS DS Frag Mgmt Data
51
802.11 - Frame format
52
802.11 - Frame format
1 0 BSSID SA DA -
1 1 Receiver Transmitter DA -
Address(RA) Address(TA)
53
802.11 - Frame format
More Fragments :
Set to 1 if more fragments are to follow.
RETRY
If the current frame is a duplicate because of retransmissions, this
field is set to 1.
54
802.11 - Frame format
Power Management
0 : Stn is in stand-by mode
1 : stn stays active
More Data :
To indicate to the receiver that more data is to follow.
To indicate to the stns that are in sleep mode that more data is to follow.
To indicate to an access point that more polling is required.
Wired Equivalent Privacy (WEP) :
To indicate that standard 802.11 security algorithm is used.
Order :
If set to 1, frames have to be taken strictly in the same order that they are
received.
55
MAC address format
56
Special Frames: ACK, RTS, CTS
bytes 2 2 6 4
AcknowledgementACK Frame
Duration
Receiver
CRC
Control Address
bytes 2 2 6 6 4
Frame Receiver Transmitter
Request To Send RTS Control
Duration
Address Address
CRC
bytes 2 2 6 4
Frame Receiver
Clear To Send CTS
Control
Duration
Address
CRC
57
802.11 - MAC management
Synchronization
try to find a LAN, try to stay within a LAN
timer etc.
Power management
sleep-mode without missing a message
periodic sleep, frame buffering, traffic measurements
Association/Reassociation
integration into a LAN
roaming, i.e. change networks by changing access points
scanning, i.e. active search for a network
MIB - Management Information Base
All parameters concerning the present state of the wireless stn and
access point are stored in MIB. These can be accessed via a
protocol line SNMP.
58
Synchronization using a Beacon (infrastructure)
beacon interval
B B B B
access
point
busy busy busy busy
medium
t
value of the timestamp B beacon frame
59
Synchronization using a Beacon (infrastructure)
Nodes need to hear the beacons and adjust the timing. But nodes need not
adjust to every beacon.
If the medium is busy, access point may not be able to send the beacons on
certain occasions. Beacon intervals are not shifted if a beacon is missed.
60
Synchronization using a Beacon (ad-hoc)
beacon interval
B1 B1
station1
B2 B2
station2
61
Synchronization using a Beacon (ad-hoc)
No Access Point
Each node maintains a sync timer and starts sending to the rest
of the nodes.
It uses a standard back-off algorithm and and only one beacon
wins.
All other stns adjust their internal clock as per the received
beacon. They suppress their beacons for this cycle.
If there is a collision, the beacon is lost. In this situation, beacon
intervals can be slightly shifted and the following cycles
synchronizes all stns.
62
Power management
63
Power saving with wake-up patterns (infrastructure)
.........Only One Station Shown...........
D B T T d D B
access
point
busy busy busy busy
medium
p d
station
t
T TIM D DTIM awake
64
Power saving with wake-up patterns (infrastructure)
65
Power saving with wake-up patterns (ad-hoc)
ATIM
window beacon interval
B1 A D B1
station1
B2 B2 a d
station2
t
B beacon frame random delay A transmit ATIM D transmit data
66
Power saving with wake-up patterns (ad-hoc)
Each participating station has to buffer the data since access points do
not exist.
In the period that all stations are awake, all the participating station send
a list of buffered frames and the stations that are targeted to receive
these. These are sent through “Adhoc Traffic Information Map(ATIM)”
All stations stay awake during this ATIM period and listen to the
ATIM.
In the example, ATIM of station-1 contains the address of station-2.
Stn-2 acknowledges the ATIM, waits for the data and later
acknowledges the data.
With more stations wanting to send their frames, collisions can be
substantial.
Access delay is not easy to predict and so, QoS can’t be guaranteed.
67