Lecture #2 Chapter 14 Wireless LANs.

Slides:



Advertisements
Similar presentations
Chapter 14 무선 LAN (Wireless LAN).
Advertisements

14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Networks: Wireless LANs1 Wireless Local Area Networks.
Contents IEEE MAC layer operation Basic CSMA/CA operation
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Wireless LAN (not assessed) Dr Sandra I. Woolley.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Technology CSE Network Technology CSE3020 Week 9.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
Wireless Networking So we talked about wired networks. What about wireless?
Networks: Wireless LANs1 Wireless Local Area Networks.
Wireless Local Area Networks
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Networks: Wireless LANs1 Wireless Local Area Networks.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
1 Kyung Hee University Chapter 15 Wireless LANs. 2 Kyung Hee University IEEE 802 Standards Working Groups WiMAX, an acronym that stands for Worldwide.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IEEE Wireless LAN Standard
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Chapter 15 Wireless LANs 15.# 1
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 13 Wired LANs: Ethernet
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
March 22, 2004 Prof. Paul Lin 1 CPET The Medium Access Control Sublayer – Wireless LAN Paul I-Hai Lin, Professor Electrical and Computer Engineering.
Wireless LAN By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal
SSN College of Engineering
Chapter 15 Wireless LANs.
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Chapter 3 Wireless LANs This work is licensed under the Creative Commons Attribution-NonCommercial 4.0 International License. To view a copy of this.
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 6 Wireless LANS
Wireless Local Area Networks (LANs)
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 6 Wireless LANS
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 6 Medium Access Control Protocols and Local Area Networks
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
ECSE-4730: Computer Communication Networks (CCN)
Introduction Wireless communication is one of the fastest-growing technologies The demand for connecting devices without the use of cables is increasing.
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Wireless LANs.
Presentation transcript:

Lecture #2 Chapter 14 Wireless LANs

14-1 IEEE 802.11 IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers.

A BSS without an AP is called an ad hoc network; Note A BSS without an AP is called an ad hoc network; a BSS with an AP is called an infrastructure network.

Figure 14.1 Basic service sets (BSSs)

Figure 14.2 Extended service sets (ESSs)

Figure 14.3 MAC layers in IEEE 802.11 standard

Why Wireless LANs cannot Implement CSMA/CD A station must be able to send data and receive collision signals at the same time. This can be very costly. Collision may not be detected because of the hidden station problem. The distance between stations can be great. Signal fading could prevent a station a station at one end from hearing a collision at the other end.

Figure 14.4 CSMA/CA flowchart Distributed Interframe Space Short Interframe Space

Figure 14.5 CSMA/CA and NAV Network Allocation Vector

Network Allocation Vector How do other stations defer sending their data if one station acquires access? When a station sends an RTS frame, it includes the duration of time that it needs to occupy the channel. The stations that are affected by this transmission create a timer called a NAV that shows how much time must pass before these stations are allowed to check the channel for idleness. Each station, before sensing the physical medium to see if it is idle, first checks its NAV to see if it is expired.

Collision During Handshaking Two or more station may try to send RTS frames at the same time….these may collide. There is no mechanism for collision detection. The sender assumes there has been a collision if it has not received a CTS frame from the receiver. The back-off strategy is employed and the sender tries again.

Point Coordination Function PCF Is an optional access method that can be implemented in an infrastructure network (not an AD HOC). It is implemented on top of the DCF and is used for time-sensitive transmission. PCF has a centralized, contention-free polling access method. The AP performs polling for stations that are capable of being polled. The stations are polled one after the other, sending any data they have to the AP. To give priority to PCF over DCF, another set of interframe spaces has been defined: PIFS and SIFS. The SIFS is the same as that in DCF, but the PIFS (PCF IFS) is shorter than in DIFS. This means that if, at the same time, a station wants to use only DCF and an AP wants to use PCF, the AP has priority. Due to the priority of PCF over DCF, stations that only use DCF may not gain access to the medium. To prevent this, a repetition interval has been designed to cover both contention-free(PCF) and contention-based(DCF) traffic. The repetition interval which is repeated continuously, starts with a special control frame B (Beacon Frame). When the stations hear the beacon frame, they start their NAV for the duration of the contention-free period of the .repetition interval

Figure 14.6 Example of repetition interval

Figure 14.7 Frame format Frame Control Duration of transmission (in one only: frame ID)

Table 14.1 Subfields in FC field

Figure 14.8 Control frames

Table 14.2 Values of subfields in control frames

Table 14.3 Addresses

Figure 14.9 Addressing mechanisms

Figure 14.10 Hidden station problem

Hidden station problem Assume that station B is sending data to station A. In the middle of this transmission, station C also has data to send to A. However, station C is out of B’s range and transmission from B to A cannot reach C. C thinks the medium is free, and sends its dta to A which results in a collision at A because A is receiving from B and C. In this case we say that B and C are hidden from each other with respect to A. Hidden stations can reduce the capacity of the network because of the possibility of collision. The solution is the use of the handshake frames. C receives CTS and hence knows that some hidden station is using the channel and refrains from transmitting until the duration is over.

Note The CTS frame in CSMA/CA handshake can prevent collision from a hidden station.

Figure 14.11 Use of handshaking to prevent hidden station problem

Figure 14.12 Exposed station problem A is sending to B C has data to send to D C is exposed to transmission from A. C refrains!! A station refrains from using a channel when it is ,in fact, available.

Figure 14.13 Use of handshaking in exposed station problem

Table 14.4 Physical layers

Figure 14.14 Industrial, scientific, and medical (ISM) band

Figure 14.15 Physical layer of IEEE 802.11 FHSS

Figure 14.16 Physical layer of IEEE 802.11 DSSS

Figure 14.17 Physical layer of IEEE 802.11 infrared

IEEE 802.11a OFDM IEEE 802.11a OFDM describes the orthogonal frequency division multiplexing . For signal generation in a 5-Ghz ISM band. OFDM is similar to FDM with one major difference: All the subbands are used by one source at a given time. Sources contend with one another at the data link layer for access. The band is divided into 52 subbands, with 48 subbands for sending 48 groups of bits at a time and 4 subbands for control information. The scheme is similar to ADSL. Dividing the ban into subbands diminishes the effects of interference. If the subbands are used randomly, security can also be increased. OFDM uses PSK and QAM for modulation. The common rates are 18Mbps (PSK) and 54 Mbps(QAM).

Figure 14.18 Physical layer of IEEE 802.11b HR-DSSS Complementary code keying

14-2 BLUETOOTH Bluetooth is a wireless LAN technology designed to connect devices of different functions such as telephones, notebooks, computers, cameras, printers, coffee makers, and so on. A Bluetooth LAN is an ad hoc network, which means that the network is formed spontaneously. A Bluetooth LAN can be connected to the Internet if one of the devices has this capability. Bluetooth technology is the implementation of a protocol defined by IEEE802.15 standard. The protocol defines a wireless PAN operable in an area the size of a room or hall. Bluetooth defines two types of networks: piconet and scatternet.

Figure 14.19 Piconet All the secondaries synchronize their clocks and hopping sequence with the primary. Communication between the P and S can be 1: or 1:N. Max. 7 secondaries, but 8 secs. Can be in parked state.

Figure 14.20 Scatternet

Bluetooth Devices A Bluetooth device has a built-in short-range radio transmitter. The current data rate is 1 Mbps with a 2.4-Ghz bandwidth. This means that there is a possibility of interference between the IEEE 802.11b wireless and Bluetooth LANs.

Figure 14.21 Bluetooth layers

Bluetooth Band , FHSS and Modulation Bluetooth uses a 2.4GHz ISM band divided into 79 channels of 1MHz each. Bluetooth uses the FHSS method in the physical layer to avoid interference from other devices or other networks. Bluetooth hops 1600 times per second. A device uses a frequency for only 625 µs before it hops to another frequency; the dwell time is 625 µs. Bluetooth uses a sophisticated version of FSK called GFSK. (Guassian Bandwidth Filtering). The Baseband layer is equivalent to the MAC sublayer in LANs. The access method is TDMA. The primary and secondary communicate using time slots. Communication is only between a primary and a secondary. Secondaries cannot communicate directly.

Figure 14.22 Single-secondary communication

Figure 14.23 Multiple-secondary communication

Figure 14.24 Frame format types