SlideShare a Scribd company logo
Wireless LANs (IEEE802.1)
Lecture 5
G. Noubir
noubir@ccs.neu.edu
Textbook: chapters 13, 14
Slides partially from “Mobile Communications” by J. Schiller Chapter 7.
COM3525, W02, Wireless LANs – IEEE802.11
2
Outline
 Wireless LAN Technology
 Medium Access Control for Wireless
 IEEE802.11
COM3525, W02, Wireless LANs – IEEE802.11
3
Wireless LAN Applications
 LAN Extension
 Cross-building interconnect
 Nomadic Access
 Ad hoc networking
COM3525, W02, Wireless LANs – IEEE802.11
4
LAN Extension
 Wireless LAN linked into a wired LAN on
same premises
 Wired LAN

Backbone

Support servers and stationary workstations
 Wireless LAN

Stations in large open areas

Manufacturing plants, stock exchange trading floors, and
warehouses
Multiple-cell Wireless LAN
COM3525, W02, Wireless LANs – IEEE802.11
6
Cross-Building Interconnect
 Connect LANs in nearby buildings
 Wired or wireless LANs
 Point-to-point wireless link is used
 Devices connected are typically bridges or
routers
COM3525, W02, Wireless LANs – IEEE802.11
7
Nomadic Access
 Wireless link between LAN hub and mobile
data terminal equipped with antenna
 Laptop computer or notepad computer
 Uses:
 Transfer data from portable computer to office
server
 Extended environment such as campus
COM3525, W02, Wireless LANs – IEEE802.11
8
Ad Hoc Networking
 Temporary peer-to-peer network set up to meet
immediate need
 Example:
 Group of employees with laptops convene for a
meeting; employees link computers in a temporary
network for duration of meeting
COM3525, W02, Wireless LANs – IEEE802.11
9
Wireless LAN Requirements
 Throughput
 Number of nodes
 Connection to backbone LAN
 Service area
 Battery power consumption
 Transmission robustness and security
 Collocated network operation
 License-free operation
 Handoff/roaming
 Dynamic configuration
COM3525, W02, Wireless LANs – IEEE802.11
10
Wireless LAN Categories
 Infrared (IR) LANs
 Spread spectrum LANs
 Narrowband microwave
COM3525, W02, Wireless LANs – IEEE802.11
11
Strengths of Infrared Over
Microwave Radio
 Spectrum for infrared virtually unlimited
 Possibility of high data rates
 Infrared spectrum unregulated
 Equipment inexpensive and simple
 Reflected by light-colored objects
 Ceiling reflection for entire room coverage
 Doesn’t penetrate walls
 More easily secured against eavesdropping
 Less interference between different rooms
COM3525, W02, Wireless LANs – IEEE802.11
12
Drawbacks of Infrared Medium
 Indoor environments experience infrared
background radiation
 Sunlight and indoor lighting
 Ambient radiation appears as noise in an infrared
receiver
 Transmitters of higher power required

Limited by concerns of eye safety and excessive power
consumption
 Limits range
COM3525, W02, Wireless LANs – IEEE802.11
13
IR Data Transmission
Techniques
 Directed Beam Infrared
 Ominidirectional
 Diffused
COM3525, W02, Wireless LANs – IEEE802.11
14
Directed Beam Infrared
 Used to create point-to-point links
 Range depends on emitted power and degree of
focusing
 Focused IR data link can have range of
kilometers
 Cross-building interconnect between bridges or
routers
COM3525, W02, Wireless LANs – IEEE802.11
15
Ominidirectional
 Single base station within line of sight of all
other stations on LAN
 Station typically mounted on ceiling
 Base station acts as a multiport repeater
 Ceiling transmitter broadcasts signal received by IR
transceivers
 IR transceivers transmit with directional beam
aimed at ceiling base unit
COM3525, W02, Wireless LANs – IEEE802.11
16
Diffused
 All IR transmitters focused and aimed at a point
on diffusely reflecting ceiling
 IR radiation strikes ceiling
 Reradiated omnidirectionally
 Picked up by all receivers
COM3525, W02, Wireless LANs – IEEE802.11
17
Spread Spectrum LAN
Configuration
 Multiple-cell arrangement
 Within a cell, either peer-to-peer or hub
 Peer-to-peer topology
 No hub
 Access controlled with MAC algorithm

CSMA
 Appropriate for ad hoc LANs
COM3525, W02, Wireless LANs – IEEE802.11
18
Spread Spectrum LAN
Configuration
 Hub topology
 Mounted on the ceiling and connected to backbone
 May control access
 May act as multiport repeater
 Automatic handoff of mobile stations
 Stations in cell either:

Transmit to / receive from hub only

Broadcast using omnidirectional antenna
COM3525, W02, Wireless LANs – IEEE802.11
19
Narrowband Microwave LANs
 Use of a microwave radio frequency band for
signal transmission
 Relatively narrow bandwidth
 Licensed
 Unlicensed
COM3525, W02, Wireless LANs – IEEE802.11
20
Licensed Narrowband RF
 Licensed within specific geographic areas to
avoid potential interference
 Motorola - 600 licenses in 18-GHz range
 Covers all metropolitan areas
 Can assure that independent LANs in nearby
locations don’t interfere
 Encrypted transmissions prevent eavesdropping
COM3525, W02, Wireless LANs – IEEE802.11
21
Unlicensed Narrowband RF
 RadioLAN introduced narrowband wireless
LAN in 1995
 Uses unlicensed ISM spectrum
 Used at low power (0.5 watts or less)
 Operates at 10 Mbps in the 5.8-GHz band
 Range = 50 m to 100 m
COM3525, W02, Wireless LANs – IEEE802.11
22
Motivation for Wireless MAC
 Can we apply media access methods from fixed networks?
 Example CSMA/CD
 Carrier Sense Multiple Access with Collision Detection
 send as soon as the medium is free, listen into the medium if a
collision occurs (original method in IEEE 802.3)
 Problems in wireless networks
 signal strength decreases proportional to the square of the distance
 the sender would apply CS and CD, but the collisions happen at the
receiver
 it might be the case that a sender cannot “hear” the collision, i.e., CD
does not work
 furthermore, CS might not work if, e.g., a terminal is “hidden”
COM3525, W02, Wireless LANs – IEEE802.11
23
 Hidden terminals
 A sends to B, C cannot receive A
 C wants to send to B, C senses a “free” medium (CS fails)
 collision at B, A cannot receive the collision (CD fails)
 A is “hidden” for C
 Exposed terminals
 B sends to A, C wants to send to another terminal (not A or B)
 C has to wait, CS signals a medium in use
 but A is outside the radio range of C, therefore waiting is not
necessary
 C is “exposed” to B
Motivation - hidden and
exposed terminals
B
A C
COM3525, W02, Wireless LANs – IEEE802.11
24
 Terminals A and B send, C receives
 signal strength decreases proportional to the square of the distance
 the signal of terminal B therefore drowns out A’s signal
 C cannot receive A
 If C for example was an arbiter for sending rights, terminal B
would drown out terminal A already on the physical layer
 Also severe problem for CDMA-networks - precise power control
needed!
Motivation - near and far
terminals
A B C
COM3525, W02, Wireless LANs – IEEE802.11
25
Access methods
SDMA/FDMA/TDMA
 SDMA (Space Division Multiple Access)

segment space into sectors, use directed antennas

cell structure
 FDMA (Frequency Division Multiple Access)

assign a certain frequency to a transmission channel between a sender
and a receiver

permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast
hopping (FHSS, Frequency Hopping Spread Spectrum)
 TDMA (Time Division Multiple Access)

assign the fixed sending frequency to a transmission channel between
a sender and a receiver for a certain amount of time
 The multiplexing schemes are now used to control medium access!
COM3525, W02, Wireless LANs – IEEE802.11
26
FDD/FDMA - general
scheme, example GSM
f
t
124
1
124
1
20 MHz
200 kHz
890.2 MHz
935.2 MHz
915 MHz
960 MHz
COM3525, W02, Wireless LANs – IEEE802.11
27
TDD/TDMA - general
scheme, example DECT
1 2 3 11 12 1 2 3 11 12
t
downlink uplink
417 µs
COM3525, W02, Wireless LANs – IEEE802.11
28
Frequency Division Multiple
Access
 Concept:
 assign different frequency bands to different users
 no sharing of a frequency band between two users
 user separation using band-pass filters
 continuous flow
 two-way: two frequency bands or Time Division Duplex (TDD)
 Advantages: simple receivers
 longer symbol duration: no-need for equalization

low inter-symbol interference

e.g., 50kb/s QPSK =>40s >> 1-10s delay spread
 Drawbacks:
 frequency guard bands, costly tight RF band-filters,
 long fading duration: need slow frequency hopping
 may need spatial diversity (multiple antennas/beam forming) Rx/Tx
COM3525, W02, Wireless LANs – IEEE802.11
29
Frequency Selection
 Frequency management:
 Fixed (cellular phones-base stations): reuse factor
 On demand (cellular phones-mobile terminals)
 Dynamic (cordless/WLAN): based on sensing interference levels
 Problems: congestion management, dynamic load, …
 Antenna implications:
 High antennas (e.g., 50m): higher coverage but higher
interference between base stations (need for synchronization)
 Low antennas: higher attenuation, lower coverage, better reuse
 Conclusion:
 Pure FDMA is only interesting for simple cordless systems (CT-2)
COM3525, W02, Wireless LANs – IEEE802.11
30
Time Division Multiple
Access
 Concept:
 use the same frequency over non-overlapping periods of time
 Advantages:
 simple filters (window)
 transmit and receive over the same frequency channel
 Drawbacks:
 users must be synchronized with BS (master clock over a BCH)
 guard times: common 30-50s, may be less in recent systems
 short symbol duration: need for equalization, training
sequences...

high inter-symbol interference

e.g., 50Kbps, QPSK, 8 users:
 5 s symbol duration
 delay spread: 1s (cordless), upto 20s for cellular
COM3525, W02, Wireless LANs – IEEE802.11
31
FDMA/TDMA
 First channel allocation:
 random access channel (RACH) to send short requests
 ALOHA type protocol over the RACH
 One can use both FDMA and TDMA
 examples: GSM system, D-AMPS
M9
M9
M5
M5 M6
M6
M1
M1 M2
M2 M3
M3 M4
M4
M9
M9
M5
M5 M6
M6
M1
M1 M2
M2 M3
M3 M4
M4
Time
Time
Frequency
Frequency
cycle
cycle
COM3525, W02, Wireless LANs – IEEE802.11
32
Access method CDMA
CDMA (Code Division Multiple Access)
 all terminals send on the same frequency probably at the same time and can use the
whole bandwidth of the transmission channel
 codes generate signals with “good-correlation” properties

signals from another user appear as “noise” (use spread spectrum technology)

signals are spread over a wideband using pseudo-noise sequences (e.g., each sender
has a unique random number, the sender XORs the signal with this random number)
 the receiver can “tune” into this signal if it knows the pseudo random number, tuning
is done via a correlation function
Disadvantages:
 higher complexity of a receiver (receiver cannot just listen into the medium and start
receiving if there is a signal)

all signals should have the same strength at a receiver (near-far effect)
Advantages:

all terminals can use the same frequency => no planning needed; macrodiversity

huge code space (e.g. 232
) compared to frequency space
COM3525, W02, Wireless LANs – IEEE802.11
33
 Mechanism
 random, distributed (no central arbiter), time-multiplex
 Slotted Aloha additionally uses time-slots, sending must always start at
slot boundaries
 Aloha
 Slotted Aloha
Aloha/slotted aloha
sender A
sender B
sender C
collision
sender A
sender B
sender C
collision
t
t
COM3525, W02, Wireless LANs – IEEE802.11
34
Carrier Sense Protocols
Use the fact that in some networks you can sense the
medium to check whether it is currently free
 1-persistent CSMA
 non-persistent CSMA
 p-persistent protocol
 CSMA with collision Detection (CSMA/CD): not applicable to
wireless systems
 1-persistent CSMA
 when a station has a packet:

it waits until the medium is free to transmit the packet

if a collision occurs, the station waits a random amount of time
 first transmission results in a collision if several stations are
waiting for the channel
COM3525, W02, Wireless LANs – IEEE802.11
35
Carrier Sense Protocols
(Cont’d)
 non-persistent CSMA
 when a station has a packet:

if the medium is free, transmit the packet

otherwise wait for a random period of time and repeat the algorithm
 higher delays, but better performance than pure ALOHA
 p-persistent protocol
 when a station has a packet wait until the medium is free:

transmit the packet with probability p

wait for next slot with probability 1-p
 better throughput than other schemes but higher delay
 CSMA with collision Detection (CSMA/CD)
 stations abort their transmission when they detect a collision
 e.g., Ethernet, IEEE802.3 but not applicable to wireless systems
COM3525, W02, Wireless LANs – IEEE802.11
36
DAMA - Demand Assigned
Multiple Access
 Channel efficiency only 18% for Aloha, 36% for Slotted
Aloha (assuming Poisson distribution for packet arrival
and packet length)
 Reservation can increase efficiency to 80%
 a sender reserves a future time-slot
 sending within this reserved time-slot is possible without
collision
 reservation also causes higher delays
 typical scheme for satellite links
 Examples for reservation algorithms:
 Explicit Reservation according to Roberts (Reservation-ALOHA)
 Implicit Reservation (PRMA)
 Reservation-TDMA
COM3525, W02, Wireless LANs – IEEE802.11
37
Access method DAMA:
Explicit Reservation
Explicit Reservation (Reservation Aloha):
 two modes:

ALOHA mode for reservation:
competition for small reservation slots, collisions possible

reserved mode for data transmission within successful reserved slots
(no collisions possible)
 it is important for all stations to keep the reservation list
consistent at any point in time and, therefore, all stations have
to synchronize from time to time
Aloha reserved Aloha reserved Aloha reserved Aloha
collision
t
COM3525, W02, Wireless LANs – IEEE802.11
38
Access method DAMA: PRMA
Implicit reservation (PRMA - Packet Reservation MA):
 a certain number of slots form a frame, frames are repeated
 stations compete for empty slots according to the slotted aloha principle
 once a station reserves a slot successfully, this slot is automatically
assigned to this station in all following frames as long as the station has
data to send
 competition for this slots starts again as soon as the slot was empty in
the last frame
frame1
frame2
frame3
frame4
frame5
1 2 3 4 5 6 7 8 time-slot
collision at
reservation
attempts
A C D A B A F
A C A B A
A B A F
A B A F D
A C E E B A F D
t
ACDABA-F
ACDABA-F
AC-ABAF-
A---BAFD
ACEEBAFD
reservation
COM3525, W02, Wireless LANs – IEEE802.11
39
Access method DAMA:
Reservation-TDMA
Reservation Time Division Multiple Access
 every frame consists of N mini-slots and x data-slots
 every station has its own mini-slot and can reserve up to k
data-slots using this mini-slot (i.e. x = N * k).
 other stations can send data in unused data-slots according
to a round-robin sending scheme (best-effort traffic)
N mini-slots N * k data-slots
reservations
for data-slots
other stations can use free data-slots
based on a round-robin scheme
e.g. N=6, k=2
COM3525, W02, Wireless LANs – IEEE802.11
40
MACA - collision avoidance
 MACA (Multiple Access with Collision Avoidance) uses
short signaling packets for collision avoidance
 RTS (request to send): a sender request the right to send from
a receiver with a short RTS packet before it sends a data packet
 CTS (clear to send): the receiver grants the right to send as
soon as it is ready to receive
 Signaling packets contain
 sender address
 receiver address
 packet size
 Variants of this method can be found in IEEE802.11 as
DFWMAC (Distributed Foundation Wireless MAC)
COM3525, W02, Wireless LANs – IEEE802.11
41
 MACA avoids the problem of hidden terminals
 A and C want to
send to B
 A sends RTS first
 C waits after receiving
CTS from B
 MACA avoids the problem of exposed terminals
 B wants to send to A, C
to another terminal
 now C does not have
to wait for it cannot
receive CTS from A
MACA examples
A B C
RTS
CTS
CTS
A B C
RTS
CTS
RTS
COM3525, W02, Wireless LANs – IEEE802.11
42
MACA variant: DFWMAC in
IEEE802.11
idle
wait for the
right to send
wait for ACK
sender receiver
packet ready to send; RTS
time-out;
RTS
CTS; data
ACK
RxBusy
idle
wait for
data
RTS; RxBusy
RTS;
CTS
data;
ACK
time-out 
data;
NAK
ACK: positive acknowledgement
NAK: negative acknowledgement
RxBusy: receiver busy
time-out 
NAK;
RTS
COM3525, W02, Wireless LANs – IEEE802.11
43
Polling mechanisms
 If one terminal can be heard by all others, this “central” terminal (a.k.a.
base station) can poll all other terminals according to a certain scheme
 now all schemes known from fixed networks can be used (typical mainframe
- terminal scenario)
 Example: Randomly Addressed Polling
 base station signals readiness to all mobile terminals
 terminals ready to send can now transmit a random number without
collision with the help of CDMA or FDMA (the random number can be seen
as dynamic address) or with collisions (over the Random Access CHannel)
 the base station now chooses one address for polling from the list of all
random numbers (collision if two terminals choose the same address)
 the base station acknowledges correct packets and continues polling the
next terminal
 this cycle starts again after polling all terminals of the list
COM3525, W02, Wireless LANs – IEEE802.11
44
ISMA (Inhibit Sense Multiple
Access)
 Current state of the medium is signaled via a “busy tone”

the base station signals on the downlink (base station to terminals)
if the medium is free or not

terminals must not send if the medium is busy
 terminals can access the medium as soon as the busy tone stops

the base station signals collisions and successful transmissions via
the busy tone and acknowledgements, respectively (media access
is not coordinated within this approach)
 mechanism used, e.g.,
for CDPD
(USA, integrated
into AMPS)
COM3525, W02, Wireless LANs – IEEE802.11
45
Comparison
SDMA/TDMA/FDMA/CDMA
Approach SDMA TDMA FDMA CDMA
Idea segment space into
cells/sectors
segment sending
time into disjoint
time-slots, demand
driven or fixed
patterns
segment the
frequency band into
disjoint sub-bands
spread the spectrum
using orthogonal codes
Terminals only one terminal can
be active in one
cell/one sector
all terminals are
active for short
periods of time on
the same frequency
every terminal has its
own frequency,
uninterrupted
all terminals can be active
at the same place at the
same moment,
uninterrupted
Signal
separation
cell structure, directed
antennas
synchronization in
the time domain
filtering in the
frequency domain
code plus special
receivers
Advantages very simple, increases
capacity per km²
established, fully
digital, flexible
simple, established,
robust
flexible, less frequency
planning needed, soft
handover
Dis-
advantages
inflexible, antennas
typically fixed
guard space
needed (multipath
propagation),
synchronization
difficult
inflexible,
frequencies are a
scarce resource
complex receivers, needs
more complicated power
control for senders
Comment only in combination
with TDMA, FDMA or
CDMA useful
standard in fixed
networks, together
with FDMA/SDMA
used in many
mobile networks
typically combined
with TDMA
(frequency hopping
patterns) and SDMA
(frequency reuse)
still faces some problems,
higher complexity,
lowered expectations; will
be integrated with
TDMA/FDMA
COM3525, W02, Wireless LANs – IEEE802.11
46
Throughputs of Some
Random Access Protocols
G: load (includes both successful transmissions and retransmissions)
S: successful transmission
a: ratio of propagation delay to the packet transmission delay
)
1
(
)
2
1
(
)
1
(
)
1
(
)
2
1
(
)]
2
/
1
(
1
[
a
G
aG
a
G
e
aG
e
a
G
e
aG
G
aG
G
G
S 














)
1
(
)
1
(
)
1
(
)
1
(
]
1
[
a
G
aG
a
G
aG
ae
e
a
e
e
G
G
S 












aG
aG
e
a
Ge
S 




)
2
1
(
a
e
aGe
S aG
aG


 

1
Protocol Throughput
Pure-ALOHA S = Ge-2G
Slotted-ALOHA S = Ge-G
Non slotted 1-persistent
Slotted 1-persistent CSMA
Nonpersistent non slotted
CSMA
Nonpersistent slotted
CSMA
COM3525, W02, Wireless LANs – IEEE802.11
47
Comparison of MAC
Algorithms
COM3525, W02, Wireless LANs – IEEE802.11
48
IEEE802.11
infrastructure
network
ad-hoc network
AP
AP
AP
wired network
AP: Access Point
COM3525, W02, Wireless LANs – IEEE802.11
49
802.11 - Architecture of an
infrastructure network
Station (STA)

terminal with access mechanisms
to the wireless medium and radio
contact to the access point
Basic Service Set (BSS)
 group of stations using the same
radio frequency
Access Point

station integrated into the
wireless LAN and the distribution
system
Portal

bridge to other (wired) networks
Distribution System

interconnection network to form
one logical network (EES:
Extended Service Set) based
on several BSS
Distribution System
Portal
802.x LAN
Access
Point
802.11 LAN
BSS2
802.11 LAN
BSS1
Access
Point
STA1
STA2 STA3
ESS
COM3525, W02, Wireless LANs – IEEE802.11
50
802.11 - Architecture of an
ad-hoc network
 Direct communication
within a limited range
 Station (STA):
terminal with access
mechanisms to the
wireless medium
 Basic Service Set (BSS):
group of stations using
the same radio frequency
802.11 LAN
BSS2
802.11 LAN
BSS1
STA1
STA4
STA5
STA2
STA3
COM3525, W02, Wireless LANs – IEEE802.11
51
IEEE standard 802.11
mobile terminal
access point
server
fixed terminal
application
TCP
802.11 PHY
802.11 MAC
IP
802.3 MAC
802.3 PHY
application
TCP
802.3 PHY
802.3 MAC
IP
802.11 MAC
802.11 PHY
LLC
infrastructure network
LLC LLC
COM3525, W02, Wireless LANs – IEEE802.11
52
802.11 - Layers and
functions
 PLCP Physical Layer Convergence Protocol
 clear channel assessment signal
(carrier sense)
 PMD Physical Medium Dependent
 modulation, coding
 PHY Management
 channel selection, MIB
 Station Management
 coordination of all management
functions
PMD
PLCP
MAC
LLC
MAC Management
PHY Management
 MAC
 access mechanisms,
fragmentation, encryption
 MAC Management
 synchronization, roaming,
MIB, power management
PHY
DLC
Station
Management
COM3525, W02, Wireless LANs – IEEE802.11
53
COM3525, W02, Wireless LANs – IEEE802.11
54
802.11 - Physical layer
 5 versions: 2 radio (typ. 2.4 GHz), 1 IR
 data rates 1 or 2 Mbit/s
 FHSS (Frequency Hopping Spread Spectrum) 2.4 GHz
 spreading, despreading, signal strength, typ. 1 Mbit/s
 min. 2.5 frequency hops/s (USA), two-level GFSK modulation
 DSSS (Direct Sequence Spread Spectrum) 2.4GHz
 DBPSK modulation for 1 Mbit/s (Differential Binary Phase Shift Keying),
DQPSK for 2 Mbit/s (Differential Quadrature PSK)
 preamble and header of a frame is always transmitted with 1 Mbit/s,
rest of transmission 1 or 2 Mbit/s
 chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker code)
 max. radiated power 1 W (USA), 100 mW (EU), min. 1mW
 Infrared
 850-950 nm, diffuse light, typ. 10 m range
 carrier detection, energy detection, synchronization
COM3525, W02, Wireless LANs – IEEE802.11
55
IEEE 802.11a and IEEE 802.11b
 IEEE 802.11a
 Makes use of 5-GHz band
 Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54 Mbps
 Uses orthogonal frequency division multiplexing (OFDM)
 Subcarrier modulated using BPSK, QPSK, 16-QAM or 64-
QAM
 IEEE 802.11b
 Provides data rates of 5.5 and 11 Mbps
 Complementary code keying (CCK) modulation scheme
COM3525, W02, Wireless LANs – IEEE802.11
56
FHSS PHY packet format
synchronization SFD PLW PSF HEC payload
PLCP preamble PLCP header
80 16 12 4 16 variable bits
 Synchronization
 synch with 010101... pattern
 SFD (Start Frame Delimiter)
 0000110010111101 start pattern
 PLW (PLCP_PDU Length Word)
 length of payload incl. 32 bit CRC of payload, PLW < 4096
 PSF (PLCP Signaling Field)
 data rate of payload (1 or 2 Mbit/s)
 HEC (Header Error Check)
 CRC with x16
+x12
+x5
+1
COM3525, W02, Wireless LANs – IEEE802.11
57
DSSS PHY packet format
synchronization SFD signal service HEC payload
PLCP preamble PLCP header
128 16 8 8 16 variable bits
length
16
 Synchronization
 synch., gain setting, energy detection, frequency offset
compensation
 SFD (Start Frame Delimiter)
 1111001110100000
 Signal
 data rate of the payload (0A: 1 Mbit/s DBPSK; 14: 2 Mbit/s DQPSK)
 Service Length
 future use, 00: 802.11 compliant  length of the payload
 HEC (Header Error Check)
 protection of signal, service and length, x16
+x12
+x5
+1
COM3525, W02, Wireless LANs – IEEE802.11
58
802.11 - MAC layer I -
DFWMAC
 Traffic services
 Asynchronous Data Service (mandatory)

exchange of data packets based on “best-effort”

support of broadcast and multicast
 Time-Bounded Service (optional)

implemented using PCF (Point Coordination Function)
 Access methods
 DFWMAC-DCF CSMA/CA (mandatory)

collision avoidance via randomized „back-off“ mechanism

minimum distance between consecutive packets

ACK packet for acknowledgements (not for broadcasts)
 DFWMAC-DCF w/ RTS/CTS (optional)

Distributed Foundation Wireless MAC

avoids hidden terminal problem
 DFWMAC- PCF (optional)

access point polls terminals according to a list
COM3525, W02, Wireless LANs – IEEE802.11
59
802.11 - MAC layer II
 Priorities
 defined through different inter frame spaces
 SIFS (Short Inter Frame Spacing)

highest priority, for ACK, CTS, polling response
 PIFS (PCF IFS)

medium priority, for time-bounded service using PCF
 DIFS (DCF, Distributed Coordination Function IFS)

lowest priority, for asynchronous data service
t
medium busy
SIFS
PIFS
DIFS
DIFS
next frame
contention
direct access if
medium is free  DIFS
COM3525, W02, Wireless LANs – IEEE802.11
60
t
medium busy
DIFS
DIFS
next frame
contention window
(randomized back-off
mechanism)
802.11 - CSMA/CA access
method I
 station ready to send starts sensing the medium (Carrier Sense
based on CCA, Clear Channel Assessment)
 if the medium is free for the duration of an Inter-Frame Space
(IFS), the station can start sending (IFS depends on service type)
 if the medium is busy, the station has to wait for a free IFS,
then the station must additionally wait a random back-off time
(collision avoidance, multiple of slot-time)
 if another station occupies the medium during the back-off
time of the station, the back-off timer stops (fairness)
slot time
direct access if
medium is free  DIFS
COM3525, W02, Wireless LANs – IEEE802.11
61
802.11 - competing stations -
simple version
t
busy
boe
station1
station2
station3
station4
station5
packet arrival at MAC
DIFS
boe
boe
boe
busy
elapsed backoff time
bor residual backoff time
busy medium not idle (frame, ack etc.)
bor
bor
DIFS
boe
boe
boe bor
DIFS
busy
busy
DIFS
boe busy
boe
boe
bor
bor
COM3525, W02, Wireless LANs – IEEE802.11
62
802.11 - CSMA/CA access
method II
 Sending unicast packets
 station has to wait for DIFS before sending data
 receivers acknowledge at once (after waiting for SIFS) if the packet was
received correctly (CRC)
 automatic retransmission of data packets in case of transmission errors
t
SIFS
DIFS
data
ACK
waiting time
other
stations
receiver
sender
data
DIFS
contention
COM3525, W02, Wireless LANs – IEEE802.11
63
802.11 - DFWMAC
 Sending unicast packets
 station can send RTS with reservation parameter after waiting for DIFS
(reservation determines amount of time the data packet needs the medium)
 acknowledgement via CTS after SIFS by receiver (if ready to receive)
 sender can now send data at once, acknowledgement via ACK
 other stations store medium reservations distributed via RTS and CTS
t
SIFS
DIFS
data
ACK
defer access
other
stations
receiver
sender
data
DIFS
contention
RTS
CTS
SIFS SIFS
NAV (RTS)
NAV (CTS)
COM3525, W02, Wireless LANs – IEEE802.11
64
Fragmentation
t
SIFS
DIFS
data
ACK1
other
stations
receiver
sender
frag1
DIFS
contention
RTS
CTS
SIFS SIFS
NAV (RTS)
NAV (CTS)
NAV (frag1)
NAV (ACK1)
SIFS
ACK2
frag2
SIFS
COM3525, W02, Wireless LANs – IEEE802.11
65
DFWMAC-PCF I
PIFS
stations‘
NAV
wireless
stations
point
coordinator
D1
U1
SIFS
NAV
SIFS
D2
U2
SIFS
SIFS
SuperFrame
t0
medium busy
t1
COM3525, W02, Wireless LANs – IEEE802.11
66
DFWMAC-PCF II
t
stations‘
NAV
wireless
stations
point
coordinator
D3
NAV
PIFS
D4
U4
SIFS
SIFS
CFend
contention
period
contention free period
t2 t3 t4
7.20.1
COM3525, W02, Wireless LANs – IEEE802.11
67
802.11 - Frame format
 Types
 control frames, management frames, data frames
 Sequence numbers
 important against duplicated frames due to lost ACKs
 Addresses
 receiver, transmitter (physical), BSS identifier, sender (logical)
 Miscellaneous
 sending time, checksum, frame control, data
Frame
Control
Duration
ID
Address
1
Address
2
Address
3
Sequence
Control
Address
4
Data CRC
2 2 6 6 6 6
2 4
0-2312
bytes
Version, Type, Subtype, To DS, From DS, More Fragments, Retry,
Power Management, More Data, Wired Equivalent Privacy (WEP), and Order
COM3525, W02, Wireless LANs – IEEE802.11
68
MAC address format
scenario to DS from
DS
address 1 address 2 address 3 address 4
ad-hoc network 0 0 DA SA BSSID -
infrastructure
network, from AP
0 1 DA BSSID SA -
infrastructure
network, to AP
1 0 BSSID SA DA -
infrastructure
network, within DS
1 1 RA TA DA SA
DS: Distribution System
AP: Access Point
DA: Destination Address (final recipient)
SA: Source Address (initiator)
BSSID: Basic Service Set Identifier
RA: Receiver Address (immediate recipient)
TA: Transmitter Address (immediate sender)
COM3525, W02, Wireless LANs – IEEE802.11
69
802.11 - MAC management
 Synchronization
 try to find a LAN, try to stay within a LAN
 timer etc.
 Power management
 sleep-mode without missing a message
 periodic sleep, frame buffering, traffic measurements
 Association/Reassociation
 integration into a LAN
 roaming, i.e. change networks by changing access points
 scanning, i.e. active search for a network
 MIB - Management Information Base
 managing, read, write
COM3525, W02, Wireless LANs – IEEE802.11
70
Synchronization using a
Beacon (infrastructure)
beacon interval
t
medium
access
point
busy
B
busy busy busy
B B B
value of the timestamp B beacon frame
COM3525, W02, Wireless LANs – IEEE802.11
71
Synchronization using a
Beacon (ad-hoc)
t
medium
station1
busy
B1
beacon interval
busy busy busy
B1
value of the timestamp B beacon frame
station2
B2 B2
random delay
COM3525, W02, Wireless LANs – IEEE802.11
72
Power management
 Idea: switch the transceiver off if not needed
 States of a station: sleep and awake
 Timing Synchronization Function (TSF)
 stations wake up at the same time
 Infrastructure
 Traffic Indication Map (TIM)

list of unicast receivers transmitted by AP
 Delivery Traffic Indication Map (DTIM)

list of broadcast/multicast receivers transmitted by AP
 Ad-hoc
 Ad-hoc Traffic Indication Map (ATIM)

announcement of receivers by stations buffering frames

more complicated - no central AP

collision of ATIMs possible (scalability?)
COM3525, W02, Wireless LANs – IEEE802.11
73
Power saving with wake-up
patterns (infrastructure)
TIM interval
t
medium
access
point
busy
D
busy busy busy
T T D
T TIM D DTIM
DTIM interval
B
B
B broadcast/multicast
station
awake
p PS poll
p
d
d
d data transmission
to/from the station
COM3525, W02, Wireless LANs – IEEE802.11
74
Power saving with wake-up
patterns (ad-hoc)
awake
A transmit ATIM D transmit data
t
station1
B1 B1
B beacon frame
station2
B2 B2
random delay
A
a
D
d
ATIM
window beacon interval
a acknowledge ATIM d acknowledge data
COM3525, W02, Wireless LANs – IEEE802.11
75
802.11 - Roaming
 No or bad connection? Then perform:
 Scanning
 scan the environment, i.e., listen into the medium for beacon signals
(passive) or send probes (active) into the medium and wait for an answer
 Reassociation Request
 station sends a request to one or several AP(s)
 Reassociation Response
 success: AP has answered, station can now participate
 failure: continue scanning
 AP accepts Reassociation Request
 signal the new station to the distribution system
 the distribution system updates its data base (i.e., location information)
 typically, the distribution system now informs the old AP so it can release
resources
Ad

More Related Content

Similar to Wireless LANs (802.11 Networks) lecture notes (20)

12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
Hattori Sidek
 
MagicBubble Slide show
MagicBubble Slide showMagicBubble Slide show
MagicBubble Slide show
Clayton E. Weimer
 
Wlan
WlanWlan
Wlan
METHODIST COLLEGE OF ENGG & TECH
 
Academic paper
Academic paperAcademic paper
Academic paper
Makerere Unversity School of Public Health, Victoria University
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Joe Christensen
 
Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik
Siber Güvenlik Toplululuğu
 
It 802 d_intro&wlan
It 802 d_intro&wlanIt 802 d_intro&wlan
It 802 d_intro&wlan
Debasis Das
 
Introduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless NetworksIntroduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless Networks
Yoram Orzach
 
Wireless LAN
Wireless LANWireless LAN
Wireless LAN
KannanKrishnana
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
SAMBIT34
 
cursuri stanciu pentru dezvoltarea securității rețelelor
cursuri stanciu pentru dezvoltarea securității rețelelorcursuri stanciu pentru dezvoltarea securității rețelelor
cursuri stanciu pentru dezvoltarea securității rețelelor
cosminvasilestrugari
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
Kathirvel Ayyaswamy
 
It fundamentals wired and wireless troubleshooting
It fundamentals   wired and wireless troubleshootingIt fundamentals   wired and wireless troubleshooting
It fundamentals wired and wireless troubleshooting
Prof. Dr. AMOL KASTURE
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
Ankur Kumar
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
CCNAResources
 
Ccna Wireless Study Guide
Ccna Wireless Study GuideCcna Wireless Study Guide
Ccna Wireless Study Guide
CCNAResources
 
Chapter-1-Overview_wireless communication.pdf
Chapter-1-Overview_wireless communication.pdfChapter-1-Overview_wireless communication.pdf
Chapter-1-Overview_wireless communication.pdf
Tof Abdu
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
Parthipan Parthi
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
SUBBIAH SURESH
 
Mobile-Wireless-Networks.pdf
Mobile-Wireless-Networks.pdfMobile-Wireless-Networks.pdf
Mobile-Wireless-Networks.pdf
vaibhav457294
 

More from DrAdeelAkram2 (14)

Wireless Networks: Transport Protocols Lecture
Wireless Networks: Transport Protocols LectureWireless Networks: Transport Protocols Lecture
Wireless Networks: Transport Protocols Lecture
DrAdeelAkram2
 
Wireless Multihop Ad Hoc Networks Lecture Notes
Wireless Multihop Ad Hoc Networks  Lecture NotesWireless Multihop Ad Hoc Networks  Lecture Notes
Wireless Multihop Ad Hoc Networks Lecture Notes
DrAdeelAkram2
 
Wireless Networks: Network Protocols/Mobile IP
Wireless Networks: Network Protocols/Mobile IPWireless Networks: Network Protocols/Mobile IP
Wireless Networks: Network Protocols/Mobile IP
DrAdeelAkram2
 
Bluetooth Techniques Peer to peer networking
Bluetooth Techniques Peer to peer networkingBluetooth Techniques Peer to peer networking
Bluetooth Techniques Peer to peer networking
DrAdeelAkram2
 
Coding and Error Control Lecture 4 Presentation
Coding and Error Control Lecture 4 PresentationCoding and Error Control Lecture 4 Presentation
Coding and Error Control Lecture 4 Presentation
DrAdeelAkram2
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
DrAdeelAkram2
 
Lec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notesLec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notes
DrAdeelAkram2
 
Wireless Ad Hoc Networking Lecture Notes
Wireless Ad Hoc Networking Lecture NotesWireless Ad Hoc Networking Lecture Notes
Wireless Ad Hoc Networking Lecture Notes
DrAdeelAkram2
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptx
DrAdeelAkram2
 
Grid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxGrid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptx
DrAdeelAkram2
 
Lecture on Internet Scale Sensor Systems
Lecture on Internet Scale Sensor SystemsLecture on Internet Scale Sensor Systems
Lecture on Internet Scale Sensor Systems
DrAdeelAkram2
 
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
DrAdeelAkram2
 
Amazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and VulnerabilitiesAmazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and Vulnerabilities
DrAdeelAkram2
 
OpenMosix.ppt
OpenMosix.pptOpenMosix.ppt
OpenMosix.ppt
DrAdeelAkram2
 
Wireless Networks: Transport Protocols Lecture
Wireless Networks: Transport Protocols LectureWireless Networks: Transport Protocols Lecture
Wireless Networks: Transport Protocols Lecture
DrAdeelAkram2
 
Wireless Multihop Ad Hoc Networks Lecture Notes
Wireless Multihop Ad Hoc Networks  Lecture NotesWireless Multihop Ad Hoc Networks  Lecture Notes
Wireless Multihop Ad Hoc Networks Lecture Notes
DrAdeelAkram2
 
Wireless Networks: Network Protocols/Mobile IP
Wireless Networks: Network Protocols/Mobile IPWireless Networks: Network Protocols/Mobile IP
Wireless Networks: Network Protocols/Mobile IP
DrAdeelAkram2
 
Bluetooth Techniques Peer to peer networking
Bluetooth Techniques Peer to peer networkingBluetooth Techniques Peer to peer networking
Bluetooth Techniques Peer to peer networking
DrAdeelAkram2
 
Coding and Error Control Lecture 4 Presentation
Coding and Error Control Lecture 4 PresentationCoding and Error Control Lecture 4 Presentation
Coding and Error Control Lecture 4 Presentation
DrAdeelAkram2
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
DrAdeelAkram2
 
Lec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notesLec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notes
DrAdeelAkram2
 
Wireless Ad Hoc Networking Lecture Notes
Wireless Ad Hoc Networking Lecture NotesWireless Ad Hoc Networking Lecture Notes
Wireless Ad Hoc Networking Lecture Notes
DrAdeelAkram2
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptx
DrAdeelAkram2
 
Grid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxGrid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptx
DrAdeelAkram2
 
Lecture on Internet Scale Sensor Systems
Lecture on Internet Scale Sensor SystemsLecture on Internet Scale Sensor Systems
Lecture on Internet Scale Sensor Systems
DrAdeelAkram2
 
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
DrAdeelAkram2
 
Amazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and VulnerabilitiesAmazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and Vulnerabilities
DrAdeelAkram2
 
Ad

Recently uploaded (20)

Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Environment .................................
Environment .................................Environment .................................
Environment .................................
shadyozq9
 
Deepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber ThreatsDeepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber Threats
RaviKumar256934
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
AI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in RetailAI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in Retail
IJDKP
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
GROUP 2 - MANUFACTURE OF LIME, GYPSUM AND CEMENT.pdf
GROUP 2 - MANUFACTURE OF LIME, GYPSUM AND CEMENT.pdfGROUP 2 - MANUFACTURE OF LIME, GYPSUM AND CEMENT.pdf
GROUP 2 - MANUFACTURE OF LIME, GYPSUM AND CEMENT.pdf
kemimafe11
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
Dahua Smart Cityyyyyyyyyyyyyyyyyy2025.pdf
Dahua Smart Cityyyyyyyyyyyyyyyyyy2025.pdfDahua Smart Cityyyyyyyyyyyyyyyyyy2025.pdf
Dahua Smart Cityyyyyyyyyyyyyyyyyy2025.pdf
PawachMetharattanara
 
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
DeFAIMint | 🤖Mint to DeFAI. Vibe Trading as NFT
DeFAIMint | 🤖Mint to DeFAI. Vibe Trading as NFTDeFAIMint | 🤖Mint to DeFAI. Vibe Trading as NFT
DeFAIMint | 🤖Mint to DeFAI. Vibe Trading as NFT
Kyohei Ito
 
UNIT 3 Software Engineering (BCS601) EIOV.pdf
UNIT 3 Software Engineering (BCS601) EIOV.pdfUNIT 3 Software Engineering (BCS601) EIOV.pdf
UNIT 3 Software Engineering (BCS601) EIOV.pdf
sikarwaramit089
 
AI Chatbots & Software Development Teams
AI Chatbots & Software Development TeamsAI Chatbots & Software Development Teams
AI Chatbots & Software Development Teams
Joe Krall
 
David Boutry - Specializes In AWS, Microservices And Python
David Boutry - Specializes In AWS, Microservices And PythonDavid Boutry - Specializes In AWS, Microservices And Python
David Boutry - Specializes In AWS, Microservices And Python
David Boutry
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Environment .................................
Environment .................................Environment .................................
Environment .................................
shadyozq9
 
Deepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber ThreatsDeepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber Threats
RaviKumar256934
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
AI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in RetailAI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in Retail
IJDKP
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
GROUP 2 - MANUFACTURE OF LIME, GYPSUM AND CEMENT.pdf
GROUP 2 - MANUFACTURE OF LIME, GYPSUM AND CEMENT.pdfGROUP 2 - MANUFACTURE OF LIME, GYPSUM AND CEMENT.pdf
GROUP 2 - MANUFACTURE OF LIME, GYPSUM AND CEMENT.pdf
kemimafe11
 
Dahua Smart Cityyyyyyyyyyyyyyyyyy2025.pdf
Dahua Smart Cityyyyyyyyyyyyyyyyyy2025.pdfDahua Smart Cityyyyyyyyyyyyyyyyyy2025.pdf
Dahua Smart Cityyyyyyyyyyyyyyyyyy2025.pdf
PawachMetharattanara
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
DeFAIMint | 🤖Mint to DeFAI. Vibe Trading as NFT
DeFAIMint | 🤖Mint to DeFAI. Vibe Trading as NFTDeFAIMint | 🤖Mint to DeFAI. Vibe Trading as NFT
DeFAIMint | 🤖Mint to DeFAI. Vibe Trading as NFT
Kyohei Ito
 
UNIT 3 Software Engineering (BCS601) EIOV.pdf
UNIT 3 Software Engineering (BCS601) EIOV.pdfUNIT 3 Software Engineering (BCS601) EIOV.pdf
UNIT 3 Software Engineering (BCS601) EIOV.pdf
sikarwaramit089
 
AI Chatbots & Software Development Teams
AI Chatbots & Software Development TeamsAI Chatbots & Software Development Teams
AI Chatbots & Software Development Teams
Joe Krall
 
David Boutry - Specializes In AWS, Microservices And Python
David Boutry - Specializes In AWS, Microservices And PythonDavid Boutry - Specializes In AWS, Microservices And Python
David Boutry - Specializes In AWS, Microservices And Python
David Boutry
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Ad

Wireless LANs (802.11 Networks) lecture notes

  • 1. Wireless LANs (IEEE802.1) Lecture 5 G. Noubir noubir@ccs.neu.edu Textbook: chapters 13, 14 Slides partially from “Mobile Communications” by J. Schiller Chapter 7.
  • 2. COM3525, W02, Wireless LANs – IEEE802.11 2 Outline  Wireless LAN Technology  Medium Access Control for Wireless  IEEE802.11
  • 3. COM3525, W02, Wireless LANs – IEEE802.11 3 Wireless LAN Applications  LAN Extension  Cross-building interconnect  Nomadic Access  Ad hoc networking
  • 4. COM3525, W02, Wireless LANs – IEEE802.11 4 LAN Extension  Wireless LAN linked into a wired LAN on same premises  Wired LAN  Backbone  Support servers and stationary workstations  Wireless LAN  Stations in large open areas  Manufacturing plants, stock exchange trading floors, and warehouses
  • 6. COM3525, W02, Wireless LANs – IEEE802.11 6 Cross-Building Interconnect  Connect LANs in nearby buildings  Wired or wireless LANs  Point-to-point wireless link is used  Devices connected are typically bridges or routers
  • 7. COM3525, W02, Wireless LANs – IEEE802.11 7 Nomadic Access  Wireless link between LAN hub and mobile data terminal equipped with antenna  Laptop computer or notepad computer  Uses:  Transfer data from portable computer to office server  Extended environment such as campus
  • 8. COM3525, W02, Wireless LANs – IEEE802.11 8 Ad Hoc Networking  Temporary peer-to-peer network set up to meet immediate need  Example:  Group of employees with laptops convene for a meeting; employees link computers in a temporary network for duration of meeting
  • 9. COM3525, W02, Wireless LANs – IEEE802.11 9 Wireless LAN Requirements  Throughput  Number of nodes  Connection to backbone LAN  Service area  Battery power consumption  Transmission robustness and security  Collocated network operation  License-free operation  Handoff/roaming  Dynamic configuration
  • 10. COM3525, W02, Wireless LANs – IEEE802.11 10 Wireless LAN Categories  Infrared (IR) LANs  Spread spectrum LANs  Narrowband microwave
  • 11. COM3525, W02, Wireless LANs – IEEE802.11 11 Strengths of Infrared Over Microwave Radio  Spectrum for infrared virtually unlimited  Possibility of high data rates  Infrared spectrum unregulated  Equipment inexpensive and simple  Reflected by light-colored objects  Ceiling reflection for entire room coverage  Doesn’t penetrate walls  More easily secured against eavesdropping  Less interference between different rooms
  • 12. COM3525, W02, Wireless LANs – IEEE802.11 12 Drawbacks of Infrared Medium  Indoor environments experience infrared background radiation  Sunlight and indoor lighting  Ambient radiation appears as noise in an infrared receiver  Transmitters of higher power required  Limited by concerns of eye safety and excessive power consumption  Limits range
  • 13. COM3525, W02, Wireless LANs – IEEE802.11 13 IR Data Transmission Techniques  Directed Beam Infrared  Ominidirectional  Diffused
  • 14. COM3525, W02, Wireless LANs – IEEE802.11 14 Directed Beam Infrared  Used to create point-to-point links  Range depends on emitted power and degree of focusing  Focused IR data link can have range of kilometers  Cross-building interconnect between bridges or routers
  • 15. COM3525, W02, Wireless LANs – IEEE802.11 15 Ominidirectional  Single base station within line of sight of all other stations on LAN  Station typically mounted on ceiling  Base station acts as a multiport repeater  Ceiling transmitter broadcasts signal received by IR transceivers  IR transceivers transmit with directional beam aimed at ceiling base unit
  • 16. COM3525, W02, Wireless LANs – IEEE802.11 16 Diffused  All IR transmitters focused and aimed at a point on diffusely reflecting ceiling  IR radiation strikes ceiling  Reradiated omnidirectionally  Picked up by all receivers
  • 17. COM3525, W02, Wireless LANs – IEEE802.11 17 Spread Spectrum LAN Configuration  Multiple-cell arrangement  Within a cell, either peer-to-peer or hub  Peer-to-peer topology  No hub  Access controlled with MAC algorithm  CSMA  Appropriate for ad hoc LANs
  • 18. COM3525, W02, Wireless LANs – IEEE802.11 18 Spread Spectrum LAN Configuration  Hub topology  Mounted on the ceiling and connected to backbone  May control access  May act as multiport repeater  Automatic handoff of mobile stations  Stations in cell either:  Transmit to / receive from hub only  Broadcast using omnidirectional antenna
  • 19. COM3525, W02, Wireless LANs – IEEE802.11 19 Narrowband Microwave LANs  Use of a microwave radio frequency band for signal transmission  Relatively narrow bandwidth  Licensed  Unlicensed
  • 20. COM3525, W02, Wireless LANs – IEEE802.11 20 Licensed Narrowband RF  Licensed within specific geographic areas to avoid potential interference  Motorola - 600 licenses in 18-GHz range  Covers all metropolitan areas  Can assure that independent LANs in nearby locations don’t interfere  Encrypted transmissions prevent eavesdropping
  • 21. COM3525, W02, Wireless LANs – IEEE802.11 21 Unlicensed Narrowband RF  RadioLAN introduced narrowband wireless LAN in 1995  Uses unlicensed ISM spectrum  Used at low power (0.5 watts or less)  Operates at 10 Mbps in the 5.8-GHz band  Range = 50 m to 100 m
  • 22. COM3525, W02, Wireless LANs – IEEE802.11 22 Motivation for Wireless MAC  Can we apply media access methods from fixed networks?  Example CSMA/CD  Carrier Sense Multiple Access with Collision Detection  send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3)  Problems in wireless networks  signal strength decreases proportional to the square of the distance  the sender would apply CS and CD, but the collisions happen at the receiver  it might be the case that a sender cannot “hear” the collision, i.e., CD does not work  furthermore, CS might not work if, e.g., a terminal is “hidden”
  • 23. COM3525, W02, Wireless LANs – IEEE802.11 23  Hidden terminals  A sends to B, C cannot receive A  C wants to send to B, C senses a “free” medium (CS fails)  collision at B, A cannot receive the collision (CD fails)  A is “hidden” for C  Exposed terminals  B sends to A, C wants to send to another terminal (not A or B)  C has to wait, CS signals a medium in use  but A is outside the radio range of C, therefore waiting is not necessary  C is “exposed” to B Motivation - hidden and exposed terminals B A C
  • 24. COM3525, W02, Wireless LANs – IEEE802.11 24  Terminals A and B send, C receives  signal strength decreases proportional to the square of the distance  the signal of terminal B therefore drowns out A’s signal  C cannot receive A  If C for example was an arbiter for sending rights, terminal B would drown out terminal A already on the physical layer  Also severe problem for CDMA-networks - precise power control needed! Motivation - near and far terminals A B C
  • 25. COM3525, W02, Wireless LANs – IEEE802.11 25 Access methods SDMA/FDMA/TDMA  SDMA (Space Division Multiple Access)  segment space into sectors, use directed antennas  cell structure  FDMA (Frequency Division Multiple Access)  assign a certain frequency to a transmission channel between a sender and a receiver  permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum)  TDMA (Time Division Multiple Access)  assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time  The multiplexing schemes are now used to control medium access!
  • 26. COM3525, W02, Wireless LANs – IEEE802.11 26 FDD/FDMA - general scheme, example GSM f t 124 1 124 1 20 MHz 200 kHz 890.2 MHz 935.2 MHz 915 MHz 960 MHz
  • 27. COM3525, W02, Wireless LANs – IEEE802.11 27 TDD/TDMA - general scheme, example DECT 1 2 3 11 12 1 2 3 11 12 t downlink uplink 417 µs
  • 28. COM3525, W02, Wireless LANs – IEEE802.11 28 Frequency Division Multiple Access  Concept:  assign different frequency bands to different users  no sharing of a frequency band between two users  user separation using band-pass filters  continuous flow  two-way: two frequency bands or Time Division Duplex (TDD)  Advantages: simple receivers  longer symbol duration: no-need for equalization  low inter-symbol interference  e.g., 50kb/s QPSK =>40s >> 1-10s delay spread  Drawbacks:  frequency guard bands, costly tight RF band-filters,  long fading duration: need slow frequency hopping  may need spatial diversity (multiple antennas/beam forming) Rx/Tx
  • 29. COM3525, W02, Wireless LANs – IEEE802.11 29 Frequency Selection  Frequency management:  Fixed (cellular phones-base stations): reuse factor  On demand (cellular phones-mobile terminals)  Dynamic (cordless/WLAN): based on sensing interference levels  Problems: congestion management, dynamic load, …  Antenna implications:  High antennas (e.g., 50m): higher coverage but higher interference between base stations (need for synchronization)  Low antennas: higher attenuation, lower coverage, better reuse  Conclusion:  Pure FDMA is only interesting for simple cordless systems (CT-2)
  • 30. COM3525, W02, Wireless LANs – IEEE802.11 30 Time Division Multiple Access  Concept:  use the same frequency over non-overlapping periods of time  Advantages:  simple filters (window)  transmit and receive over the same frequency channel  Drawbacks:  users must be synchronized with BS (master clock over a BCH)  guard times: common 30-50s, may be less in recent systems  short symbol duration: need for equalization, training sequences...  high inter-symbol interference  e.g., 50Kbps, QPSK, 8 users:  5 s symbol duration  delay spread: 1s (cordless), upto 20s for cellular
  • 31. COM3525, W02, Wireless LANs – IEEE802.11 31 FDMA/TDMA  First channel allocation:  random access channel (RACH) to send short requests  ALOHA type protocol over the RACH  One can use both FDMA and TDMA  examples: GSM system, D-AMPS M9 M9 M5 M5 M6 M6 M1 M1 M2 M2 M3 M3 M4 M4 M9 M9 M5 M5 M6 M6 M1 M1 M2 M2 M3 M3 M4 M4 Time Time Frequency Frequency cycle cycle
  • 32. COM3525, W02, Wireless LANs – IEEE802.11 32 Access method CDMA CDMA (Code Division Multiple Access)  all terminals send on the same frequency probably at the same time and can use the whole bandwidth of the transmission channel  codes generate signals with “good-correlation” properties  signals from another user appear as “noise” (use spread spectrum technology)  signals are spread over a wideband using pseudo-noise sequences (e.g., each sender has a unique random number, the sender XORs the signal with this random number)  the receiver can “tune” into this signal if it knows the pseudo random number, tuning is done via a correlation function Disadvantages:  higher complexity of a receiver (receiver cannot just listen into the medium and start receiving if there is a signal)  all signals should have the same strength at a receiver (near-far effect) Advantages:  all terminals can use the same frequency => no planning needed; macrodiversity  huge code space (e.g. 232 ) compared to frequency space
  • 33. COM3525, W02, Wireless LANs – IEEE802.11 33  Mechanism  random, distributed (no central arbiter), time-multiplex  Slotted Aloha additionally uses time-slots, sending must always start at slot boundaries  Aloha  Slotted Aloha Aloha/slotted aloha sender A sender B sender C collision sender A sender B sender C collision t t
  • 34. COM3525, W02, Wireless LANs – IEEE802.11 34 Carrier Sense Protocols Use the fact that in some networks you can sense the medium to check whether it is currently free  1-persistent CSMA  non-persistent CSMA  p-persistent protocol  CSMA with collision Detection (CSMA/CD): not applicable to wireless systems  1-persistent CSMA  when a station has a packet:  it waits until the medium is free to transmit the packet  if a collision occurs, the station waits a random amount of time  first transmission results in a collision if several stations are waiting for the channel
  • 35. COM3525, W02, Wireless LANs – IEEE802.11 35 Carrier Sense Protocols (Cont’d)  non-persistent CSMA  when a station has a packet:  if the medium is free, transmit the packet  otherwise wait for a random period of time and repeat the algorithm  higher delays, but better performance than pure ALOHA  p-persistent protocol  when a station has a packet wait until the medium is free:  transmit the packet with probability p  wait for next slot with probability 1-p  better throughput than other schemes but higher delay  CSMA with collision Detection (CSMA/CD)  stations abort their transmission when they detect a collision  e.g., Ethernet, IEEE802.3 but not applicable to wireless systems
  • 36. COM3525, W02, Wireless LANs – IEEE802.11 36 DAMA - Demand Assigned Multiple Access  Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming Poisson distribution for packet arrival and packet length)  Reservation can increase efficiency to 80%  a sender reserves a future time-slot  sending within this reserved time-slot is possible without collision  reservation also causes higher delays  typical scheme for satellite links  Examples for reservation algorithms:  Explicit Reservation according to Roberts (Reservation-ALOHA)  Implicit Reservation (PRMA)  Reservation-TDMA
  • 37. COM3525, W02, Wireless LANs – IEEE802.11 37 Access method DAMA: Explicit Reservation Explicit Reservation (Reservation Aloha):  two modes:  ALOHA mode for reservation: competition for small reservation slots, collisions possible  reserved mode for data transmission within successful reserved slots (no collisions possible)  it is important for all stations to keep the reservation list consistent at any point in time and, therefore, all stations have to synchronize from time to time Aloha reserved Aloha reserved Aloha reserved Aloha collision t
  • 38. COM3525, W02, Wireless LANs – IEEE802.11 38 Access method DAMA: PRMA Implicit reservation (PRMA - Packet Reservation MA):  a certain number of slots form a frame, frames are repeated  stations compete for empty slots according to the slotted aloha principle  once a station reserves a slot successfully, this slot is automatically assigned to this station in all following frames as long as the station has data to send  competition for this slots starts again as soon as the slot was empty in the last frame frame1 frame2 frame3 frame4 frame5 1 2 3 4 5 6 7 8 time-slot collision at reservation attempts A C D A B A F A C A B A A B A F A B A F D A C E E B A F D t ACDABA-F ACDABA-F AC-ABAF- A---BAFD ACEEBAFD reservation
  • 39. COM3525, W02, Wireless LANs – IEEE802.11 39 Access method DAMA: Reservation-TDMA Reservation Time Division Multiple Access  every frame consists of N mini-slots and x data-slots  every station has its own mini-slot and can reserve up to k data-slots using this mini-slot (i.e. x = N * k).  other stations can send data in unused data-slots according to a round-robin sending scheme (best-effort traffic) N mini-slots N * k data-slots reservations for data-slots other stations can use free data-slots based on a round-robin scheme e.g. N=6, k=2
  • 40. COM3525, W02, Wireless LANs – IEEE802.11 40 MACA - collision avoidance  MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidance  RTS (request to send): a sender request the right to send from a receiver with a short RTS packet before it sends a data packet  CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive  Signaling packets contain  sender address  receiver address  packet size  Variants of this method can be found in IEEE802.11 as DFWMAC (Distributed Foundation Wireless MAC)
  • 41. COM3525, W02, Wireless LANs – IEEE802.11 41  MACA avoids the problem of hidden terminals  A and C want to send to B  A sends RTS first  C waits after receiving CTS from B  MACA avoids the problem of exposed terminals  B wants to send to A, C to another terminal  now C does not have to wait for it cannot receive CTS from A MACA examples A B C RTS CTS CTS A B C RTS CTS RTS
  • 42. COM3525, W02, Wireless LANs – IEEE802.11 42 MACA variant: DFWMAC in IEEE802.11 idle wait for the right to send wait for ACK sender receiver packet ready to send; RTS time-out; RTS CTS; data ACK RxBusy idle wait for data RTS; RxBusy RTS; CTS data; ACK time-out  data; NAK ACK: positive acknowledgement NAK: negative acknowledgement RxBusy: receiver busy time-out  NAK; RTS
  • 43. COM3525, W02, Wireless LANs – IEEE802.11 43 Polling mechanisms  If one terminal can be heard by all others, this “central” terminal (a.k.a. base station) can poll all other terminals according to a certain scheme  now all schemes known from fixed networks can be used (typical mainframe - terminal scenario)  Example: Randomly Addressed Polling  base station signals readiness to all mobile terminals  terminals ready to send can now transmit a random number without collision with the help of CDMA or FDMA (the random number can be seen as dynamic address) or with collisions (over the Random Access CHannel)  the base station now chooses one address for polling from the list of all random numbers (collision if two terminals choose the same address)  the base station acknowledges correct packets and continues polling the next terminal  this cycle starts again after polling all terminals of the list
  • 44. COM3525, W02, Wireless LANs – IEEE802.11 44 ISMA (Inhibit Sense Multiple Access)  Current state of the medium is signaled via a “busy tone”  the base station signals on the downlink (base station to terminals) if the medium is free or not  terminals must not send if the medium is busy  terminals can access the medium as soon as the busy tone stops  the base station signals collisions and successful transmissions via the busy tone and acknowledgements, respectively (media access is not coordinated within this approach)  mechanism used, e.g., for CDPD (USA, integrated into AMPS)
  • 45. COM3525, W02, Wireless LANs – IEEE802.11 45 Comparison SDMA/TDMA/FDMA/CDMA Approach SDMA TDMA FDMA CDMA Idea segment space into cells/sectors segment sending time into disjoint time-slots, demand driven or fixed patterns segment the frequency band into disjoint sub-bands spread the spectrum using orthogonal codes Terminals only one terminal can be active in one cell/one sector all terminals are active for short periods of time on the same frequency every terminal has its own frequency, uninterrupted all terminals can be active at the same place at the same moment, uninterrupted Signal separation cell structure, directed antennas synchronization in the time domain filtering in the frequency domain code plus special receivers Advantages very simple, increases capacity per km² established, fully digital, flexible simple, established, robust flexible, less frequency planning needed, soft handover Dis- advantages inflexible, antennas typically fixed guard space needed (multipath propagation), synchronization difficult inflexible, frequencies are a scarce resource complex receivers, needs more complicated power control for senders Comment only in combination with TDMA, FDMA or CDMA useful standard in fixed networks, together with FDMA/SDMA used in many mobile networks typically combined with TDMA (frequency hopping patterns) and SDMA (frequency reuse) still faces some problems, higher complexity, lowered expectations; will be integrated with TDMA/FDMA
  • 46. COM3525, W02, Wireless LANs – IEEE802.11 46 Throughputs of Some Random Access Protocols G: load (includes both successful transmissions and retransmissions) S: successful transmission a: ratio of propagation delay to the packet transmission delay ) 1 ( ) 2 1 ( ) 1 ( ) 1 ( ) 2 1 ( )] 2 / 1 ( 1 [ a G aG a G e aG e a G e aG G aG G G S                ) 1 ( ) 1 ( ) 1 ( ) 1 ( ] 1 [ a G aG a G aG ae e a e e G G S              aG aG e a Ge S      ) 2 1 ( a e aGe S aG aG      1 Protocol Throughput Pure-ALOHA S = Ge-2G Slotted-ALOHA S = Ge-G Non slotted 1-persistent Slotted 1-persistent CSMA Nonpersistent non slotted CSMA Nonpersistent slotted CSMA
  • 47. COM3525, W02, Wireless LANs – IEEE802.11 47 Comparison of MAC Algorithms
  • 48. COM3525, W02, Wireless LANs – IEEE802.11 48 IEEE802.11 infrastructure network ad-hoc network AP AP AP wired network AP: Access Point
  • 49. COM3525, W02, Wireless LANs – IEEE802.11 49 802.11 - Architecture of an infrastructure network Station (STA)  terminal with access mechanisms to the wireless medium and radio contact to the access point Basic Service Set (BSS)  group of stations using the same radio frequency Access Point  station integrated into the wireless LAN and the distribution system Portal  bridge to other (wired) networks Distribution System  interconnection network to form one logical network (EES: Extended Service Set) based on several BSS Distribution System Portal 802.x LAN Access Point 802.11 LAN BSS2 802.11 LAN BSS1 Access Point STA1 STA2 STA3 ESS
  • 50. COM3525, W02, Wireless LANs – IEEE802.11 50 802.11 - Architecture of an ad-hoc network  Direct communication within a limited range  Station (STA): terminal with access mechanisms to the wireless medium  Basic Service Set (BSS): group of stations using the same radio frequency 802.11 LAN BSS2 802.11 LAN BSS1 STA1 STA4 STA5 STA2 STA3
  • 51. COM3525, W02, Wireless LANs – IEEE802.11 51 IEEE standard 802.11 mobile terminal access point server fixed terminal application TCP 802.11 PHY 802.11 MAC IP 802.3 MAC 802.3 PHY application TCP 802.3 PHY 802.3 MAC IP 802.11 MAC 802.11 PHY LLC infrastructure network LLC LLC
  • 52. COM3525, W02, Wireless LANs – IEEE802.11 52 802.11 - Layers and functions  PLCP Physical Layer Convergence Protocol  clear channel assessment signal (carrier sense)  PMD Physical Medium Dependent  modulation, coding  PHY Management  channel selection, MIB  Station Management  coordination of all management functions PMD PLCP MAC LLC MAC Management PHY Management  MAC  access mechanisms, fragmentation, encryption  MAC Management  synchronization, roaming, MIB, power management PHY DLC Station Management
  • 53. COM3525, W02, Wireless LANs – IEEE802.11 53
  • 54. COM3525, W02, Wireless LANs – IEEE802.11 54 802.11 - Physical layer  5 versions: 2 radio (typ. 2.4 GHz), 1 IR  data rates 1 or 2 Mbit/s  FHSS (Frequency Hopping Spread Spectrum) 2.4 GHz  spreading, despreading, signal strength, typ. 1 Mbit/s  min. 2.5 frequency hops/s (USA), two-level GFSK modulation  DSSS (Direct Sequence Spread Spectrum) 2.4GHz  DBPSK modulation for 1 Mbit/s (Differential Binary Phase Shift Keying), DQPSK for 2 Mbit/s (Differential Quadrature PSK)  preamble and header of a frame is always transmitted with 1 Mbit/s, rest of transmission 1 or 2 Mbit/s  chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker code)  max. radiated power 1 W (USA), 100 mW (EU), min. 1mW  Infrared  850-950 nm, diffuse light, typ. 10 m range  carrier detection, energy detection, synchronization
  • 55. COM3525, W02, Wireless LANs – IEEE802.11 55 IEEE 802.11a and IEEE 802.11b  IEEE 802.11a  Makes use of 5-GHz band  Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54 Mbps  Uses orthogonal frequency division multiplexing (OFDM)  Subcarrier modulated using BPSK, QPSK, 16-QAM or 64- QAM  IEEE 802.11b  Provides data rates of 5.5 and 11 Mbps  Complementary code keying (CCK) modulation scheme
  • 56. COM3525, W02, Wireless LANs – IEEE802.11 56 FHSS PHY packet format synchronization SFD PLW PSF HEC payload PLCP preamble PLCP header 80 16 12 4 16 variable bits  Synchronization  synch with 010101... pattern  SFD (Start Frame Delimiter)  0000110010111101 start pattern  PLW (PLCP_PDU Length Word)  length of payload incl. 32 bit CRC of payload, PLW < 4096  PSF (PLCP Signaling Field)  data rate of payload (1 or 2 Mbit/s)  HEC (Header Error Check)  CRC with x16 +x12 +x5 +1
  • 57. COM3525, W02, Wireless LANs – IEEE802.11 57 DSSS PHY packet format synchronization SFD signal service HEC payload PLCP preamble PLCP header 128 16 8 8 16 variable bits length 16  Synchronization  synch., gain setting, energy detection, frequency offset compensation  SFD (Start Frame Delimiter)  1111001110100000  Signal  data rate of the payload (0A: 1 Mbit/s DBPSK; 14: 2 Mbit/s DQPSK)  Service Length  future use, 00: 802.11 compliant  length of the payload  HEC (Header Error Check)  protection of signal, service and length, x16 +x12 +x5 +1
  • 58. COM3525, W02, Wireless LANs – IEEE802.11 58 802.11 - MAC layer I - DFWMAC  Traffic services  Asynchronous Data Service (mandatory)  exchange of data packets based on “best-effort”  support of broadcast and multicast  Time-Bounded Service (optional)  implemented using PCF (Point Coordination Function)  Access methods  DFWMAC-DCF CSMA/CA (mandatory)  collision avoidance via randomized „back-off“ mechanism  minimum distance between consecutive packets  ACK packet for acknowledgements (not for broadcasts)  DFWMAC-DCF w/ RTS/CTS (optional)  Distributed Foundation Wireless MAC  avoids hidden terminal problem  DFWMAC- PCF (optional)  access point polls terminals according to a list
  • 59. COM3525, W02, Wireless LANs – IEEE802.11 59 802.11 - MAC layer II  Priorities  defined through different inter frame spaces  SIFS (Short Inter Frame Spacing)  highest priority, for ACK, CTS, polling response  PIFS (PCF IFS)  medium priority, for time-bounded service using PCF  DIFS (DCF, Distributed Coordination Function IFS)  lowest priority, for asynchronous data service t medium busy SIFS PIFS DIFS DIFS next frame contention direct access if medium is free  DIFS
  • 60. COM3525, W02, Wireless LANs – IEEE802.11 60 t medium busy DIFS DIFS next frame contention window (randomized back-off mechanism) 802.11 - CSMA/CA access method I  station ready to send starts sensing the medium (Carrier Sense based on CCA, Clear Channel Assessment)  if the medium is free for the duration of an Inter-Frame Space (IFS), the station can start sending (IFS depends on service type)  if the medium is busy, the station has to wait for a free IFS, then the station must additionally wait a random back-off time (collision avoidance, multiple of slot-time)  if another station occupies the medium during the back-off time of the station, the back-off timer stops (fairness) slot time direct access if medium is free  DIFS
  • 61. COM3525, W02, Wireless LANs – IEEE802.11 61 802.11 - competing stations - simple version t busy boe station1 station2 station3 station4 station5 packet arrival at MAC DIFS boe boe boe busy elapsed backoff time bor residual backoff time busy medium not idle (frame, ack etc.) bor bor DIFS boe boe boe bor DIFS busy busy DIFS boe busy boe boe bor bor
  • 62. COM3525, W02, Wireless LANs – IEEE802.11 62 802.11 - CSMA/CA access method II  Sending unicast packets  station has to wait for DIFS before sending data  receivers acknowledge at once (after waiting for SIFS) if the packet was received correctly (CRC)  automatic retransmission of data packets in case of transmission errors t SIFS DIFS data ACK waiting time other stations receiver sender data DIFS contention
  • 63. COM3525, W02, Wireless LANs – IEEE802.11 63 802.11 - DFWMAC  Sending unicast packets  station can send RTS with reservation parameter after waiting for DIFS (reservation determines amount of time the data packet needs the medium)  acknowledgement via CTS after SIFS by receiver (if ready to receive)  sender can now send data at once, acknowledgement via ACK  other stations store medium reservations distributed via RTS and CTS t SIFS DIFS data ACK defer access other stations receiver sender data DIFS contention RTS CTS SIFS SIFS NAV (RTS) NAV (CTS)
  • 64. COM3525, W02, Wireless LANs – IEEE802.11 64 Fragmentation t SIFS DIFS data ACK1 other stations receiver sender frag1 DIFS contention RTS CTS SIFS SIFS NAV (RTS) NAV (CTS) NAV (frag1) NAV (ACK1) SIFS ACK2 frag2 SIFS
  • 65. COM3525, W02, Wireless LANs – IEEE802.11 65 DFWMAC-PCF I PIFS stations‘ NAV wireless stations point coordinator D1 U1 SIFS NAV SIFS D2 U2 SIFS SIFS SuperFrame t0 medium busy t1
  • 66. COM3525, W02, Wireless LANs – IEEE802.11 66 DFWMAC-PCF II t stations‘ NAV wireless stations point coordinator D3 NAV PIFS D4 U4 SIFS SIFS CFend contention period contention free period t2 t3 t4 7.20.1
  • 67. COM3525, W02, Wireless LANs – IEEE802.11 67 802.11 - Frame format  Types  control frames, management frames, data frames  Sequence numbers  important against duplicated frames due to lost ACKs  Addresses  receiver, transmitter (physical), BSS identifier, sender (logical)  Miscellaneous  sending time, checksum, frame control, data Frame Control Duration ID Address 1 Address 2 Address 3 Sequence Control Address 4 Data CRC 2 2 6 6 6 6 2 4 0-2312 bytes Version, Type, Subtype, To DS, From DS, More Fragments, Retry, Power Management, More Data, Wired Equivalent Privacy (WEP), and Order
  • 68. COM3525, W02, Wireless LANs – IEEE802.11 68 MAC address format scenario to DS from DS address 1 address 2 address 3 address 4 ad-hoc network 0 0 DA SA BSSID - infrastructure network, from AP 0 1 DA BSSID SA - infrastructure network, to AP 1 0 BSSID SA DA - infrastructure network, within DS 1 1 RA TA DA SA DS: Distribution System AP: Access Point DA: Destination Address (final recipient) SA: Source Address (initiator) BSSID: Basic Service Set Identifier RA: Receiver Address (immediate recipient) TA: Transmitter Address (immediate sender)
  • 69. COM3525, W02, Wireless LANs – IEEE802.11 69 802.11 - MAC management  Synchronization  try to find a LAN, try to stay within a LAN  timer etc.  Power management  sleep-mode without missing a message  periodic sleep, frame buffering, traffic measurements  Association/Reassociation  integration into a LAN  roaming, i.e. change networks by changing access points  scanning, i.e. active search for a network  MIB - Management Information Base  managing, read, write
  • 70. COM3525, W02, Wireless LANs – IEEE802.11 70 Synchronization using a Beacon (infrastructure) beacon interval t medium access point busy B busy busy busy B B B value of the timestamp B beacon frame
  • 71. COM3525, W02, Wireless LANs – IEEE802.11 71 Synchronization using a Beacon (ad-hoc) t medium station1 busy B1 beacon interval busy busy busy B1 value of the timestamp B beacon frame station2 B2 B2 random delay
  • 72. COM3525, W02, Wireless LANs – IEEE802.11 72 Power management  Idea: switch the transceiver off if not needed  States of a station: sleep and awake  Timing Synchronization Function (TSF)  stations wake up at the same time  Infrastructure  Traffic Indication Map (TIM)  list of unicast receivers transmitted by AP  Delivery Traffic Indication Map (DTIM)  list of broadcast/multicast receivers transmitted by AP  Ad-hoc  Ad-hoc Traffic Indication Map (ATIM)  announcement of receivers by stations buffering frames  more complicated - no central AP  collision of ATIMs possible (scalability?)
  • 73. COM3525, W02, Wireless LANs – IEEE802.11 73 Power saving with wake-up patterns (infrastructure) TIM interval t medium access point busy D busy busy busy T T D T TIM D DTIM DTIM interval B B B broadcast/multicast station awake p PS poll p d d d data transmission to/from the station
  • 74. COM3525, W02, Wireless LANs – IEEE802.11 74 Power saving with wake-up patterns (ad-hoc) awake A transmit ATIM D transmit data t station1 B1 B1 B beacon frame station2 B2 B2 random delay A a D d ATIM window beacon interval a acknowledge ATIM d acknowledge data
  • 75. COM3525, W02, Wireless LANs – IEEE802.11 75 802.11 - Roaming  No or bad connection? Then perform:  Scanning  scan the environment, i.e., listen into the medium for beacon signals (passive) or send probes (active) into the medium and wait for an answer  Reassociation Request  station sends a request to one or several AP(s)  Reassociation Response  success: AP has answered, station can now participate  failure: continue scanning  AP accepts Reassociation Request  signal the new station to the distribution system  the distribution system updates its data base (i.e., location information)  typically, the distribution system now informs the old AP so it can release resources

Editor's Notes

  • #54: Two levels GFSK for 2Mbps
  • #56: The Preamble SYNC field is an 80-bit field containing an alternating zero-one pattern, transmitted starting with zero and ending with one, to be used by the PHY sublayer to detect a potentially receivable signal, select an antenna if diversity is utilized, and reach steady-state frequency offset correction and synchronization with the received packet timing. The SFD consists of the 16-bit binary pattern 0000 1100 1011 1101 (transmitted leftmost bit Þrst). The Þrst bit of the SFD follows the last bit of the sync pattern. The SFD defines the frame timing.
  • #57: The SYNC field shall consist of 128 bits of scrambled 1 bit. This field shall be provided so that the receiver can perform the necessary operations for synchronization. The SFD shall be provided to indicate the start of PHY dependent parameters within the PLCP Preamble. The SFD shall be a 16-bit field, X'F3A0' (msb to lsb). The lsb shall be transmitted Þrst in time. The 8-bit IEEE 802.11 signal Þeld indicates to the PHY the modulation that shall be used for transmission (and reception) of the MPDU. The data rate shall be equal to the Signal Þeld value multiplied by 100 kbit/s.
  • #59: aSIFSTime = aRxRFDelay + aRxPLCPDelay + aMACProcessingDelay + aRxTxTurnaroundTime. aSlotTime = aCCATime + aRxTxTurnaroundTime + aAirPropagationTime + aMACProcessingDelay. PIFS = aSIFSTime + aSlotTime DIFS = aSIFSTime + 2aSlotTime EIFS = aSIFSTime + (8 ACKSize) + aPreambleLength + aPLCPHeaderLngth+ DIFS For DSSS: aSlotTime 20 µs aSIFSTime 10 µs aCCATime < 15 µs aRxTxTurnaroundTime <5 µs SIFS = PIFS = DIFS =
  • #67: There are three frame types: control (e.g., RTS/CTS/Ack), data, and management (e.g., association). Each of the frame types have several defined subtypes. Sequence control: fragment number, sequence number (remains constant for the same frame/fragment)
  • #69: Each STA shall maintain a TSF timer with modulus 2 64 counting in increments of microseconds. STAs expect to receive beacons at a nominal rate. The interval between beacons is deÞned by the aBeaconPeriod parameter of the STA. A STA sending a beacon shall set the value of the beaconÕs timestamp so that it equals the value of the STAÕs TSF timer at the time that the Þrst bit of the timestamp is transmitted to the PHY plus the transmitting STAs delays through its local PHY from the MAC-PHY interface to its interface with the wireless medium (antenna, LED emission surface, etc.). The algorithms in this clause deÞne a mechanism that maintains the synchronization of the TSF timers in a BSS to within 4 µs plus the maximum propagation delay of the PHY for PHYs of 1 Mb/s, or greater.
  • #73: PS poll: Power Save poll
  • #75: Active scanning vs. Passive scanning
  翻译: