IEEE 802.11 Wireless LAN Part I Introduction, Physical layer, basic MAC 13-1.

Slides:



Advertisements
Similar presentations
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Advertisements

Wireless LAN (not assessed) Dr Sandra I. Woolley.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Studying st lecture ~Overview of IEEE ~ Tadashi YASUMOTO.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
1 Introduction to Wireless Networks Michalis Faloutsos.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
IEEE WLAN.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Planning and Analyzing Wireless LAN
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
IEEE Wireless LAN Standard
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Lecture 27 University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CPE 400 / 600 Computer Communication Networks Prof. Shamik Sengupta.
WLAN.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
11 Chapter 4. Wireless Local Area Networks Departamento de Tecnología Electrónica Some of these slides are copyrighted by: Computer Networking: A Top Down.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
ECEN 489, Prof. Xi Zhang Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 11.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN Standard
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Wireless Mesh Networks
CS 457 – Lecture 7 Wireless Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks
Protocol Details John Bellardo UCSD.
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
EEC-484/584 Computer Networks
Presentation transcript:

IEEE Wireless LAN Part I Introduction, Physical layer, basic MAC 13-1

Why Wireless Networking? Mobility –Enable users to physically move while using an appliance. Cost Saving –Easy to install in difficult-to-wire areas (E.g., a historical Museum building) –Quick to set up (no need to pull cables) –Increased reliability due to less used cables (the probability of cable down time thus becomes less) –Get rid of messy cables in office, home, and other places

Wireless Signal Property Two type of antennas: –Omni-directional –Directional 13- 3

Signal Propagation and Quality Is Often Unpredictable A small change in position or direction may result in dramatic differences in signal strength -- whether a station is stationary or mobile! 13- 4

Wireless LAN Usages Ad hoc mode Infrastructure mode 13- 5

IEEE Equipments Lucent’s Orinoco (formly Wavelan) PCMCIA card Lucent’s access point Lucent’s Orinoco PCI card Lucent’s USB interface card 13- 6

Physical Technology Three physical technologies are defined and used in IEEE : –Direct-sequence spread spectrum Can support 1, 2, 5.5 and 11 Mbps bandwidth The most popular one in the current market. –Frequency-hopping spread spectrum Can support only 1 and 2 Mbps bandwidth Popular once but now seldom used. –Infrared light (diffused or point-to-point) Can support up to 16 Mbps bandwidth Rarely used

Why Direct Sequence Scheme? Spread a signal’s power over a wider band of frequencies. Thus this scheme requires higher bandwidth to transmit data signal. Because most interference noise signal is typically narrow in bandwidth, This will result in much less interference and bit errors

Frequency Hopping SS Must hop to another channel in 400 ms. Sender and receiver must use the same frequency hopping sequence to correctly receive data. –Good for military purpose because now eavesdropping becomes hard and signal jamming also becomes hard. Each channel uses 1 MHZ spectrum

Direct Sequence SS Convert a data signal to a higher data rate bit sequence (referred to as a chipping code). The code used in is a 11-bit Barker sequence

Uses Unlicensed ISM Band Nowadays most NICs use this area. Microwaves also use this area. So your transfer may be interfered by your microwave!

Modulation Techniques DQPSK modulation is used when the transmission rate is 2 Mbps

DSSS Physical Layer Frame Format The physical layer header (23 bytes) and the MAC layer header(34 bytes) together cause a lot of overhead. The SYNC field consists of alternating 0s and 1s. That is, …. A receiver will begin to synchronize with the incoming signal after detecting the sync. MAC Frame

DSSS Physical Layer Frame Format Start frame delimiter: always Signal: identifies the type of modulation that the receiver must use to demodulate the signal. The value of this field is equal to the data rate divided by 100 Kbps. –In , a sender can send its frame at either 1, 2, 5.5, or 11 Mbps rate. –To enable the receiver to receive frames that are sent at different rates, the sender always sends the PLCP preamble and header at the fixed 1 Mbps and the receive always listens for frames at 1 Mbps. –Thus the receiver can correctly decode the signal field at 1 Mbps and then switch to a different and higher rate to receive MPDU. Service: always 0. Length: define the number of microsecond to transmit the MPDU

Lucent Orinoco(WaveLAN) Spec. Although you have 11 channels to choose from, selected channels should be separated at least by 30 MHZ to avoid interference. So, actually there are only 3 non- overlapping channels! 11 Mbps5.5 Mbps2 Mbps1 Mbps

Application 1 No access point is needed. PC can communicate easily and directly among themselves. But no QoS can be achieved

Application 2 Access points are needed. But now Information on wired networks can be accessed and the coverage area is larger. Also QoS now is possible Although two PCs are in the same cell and can communicate directly, their communication still needs to go through the access point

Application 2 (cont.) If these access points are on the same subnet, when a mobile node move from one cell into another cell, its IP address need not be changed. Otherwise, its IP address needs to be changed and either DHCP or Mobile-IP is needed

Application 2 (cont.) If these access points use the same frequency channel, when a mobile node move from one cell into another cell, its used frequency channel need not be changed. However, it packet transmission or reception may be interfered by neighboring access points when it is at the cell boundary. f1 f2 f

Application 3 Wireless local bridges can be used to wirelessly connect two remote wired networks (e.g., two buildings). The range of these bridges can be up to 30 miles

Application 4 Wireless relay nodes can act as routers to wirelessly forward packets. (This type of network is called “packet radio network.”) Some big cities in US have deployed this type of networks

IEEE Protocol Architecture

Components of the IEEE Architecture Basic service set: the basic building block of an LAN. –Independent BSS: Also called “ad hoc network”. Stations in the same IBSS can communicate directly with each other. –Infrastructure BSS: a station in the BSS needs to become an access point. All other stations need to send packets to the AP, which then forwards the packet to the destination station

Example: BSS

Distribution System To extend the coverage area of a wireless network, sometimes we want to connect multiple BSSs. The component used to interconnect BSSs is called “distribution system (DS).” The medium used for the DS can be different from the wireless medium. (Normally most vendors just use Ethernet as the DS.) The DS can be considered as a layer-2 network. An access point (AP) is a station that provides access to the DS by providing DS services in addition to acting as a station. Data move between a BSS and the DS via an AP

Example: Distribution System

Extended Service Set A network that is formed by BSSs and DS is called the “extended service set.” ESS network appears the same to an LLC layer as an IBSS network. Stations within an ESS may communicate and mobile stations may move from one BSS to another transparently to LLC. (So, basically, an extended service set is a layer-2 network.)

Example: Extended Service Set

Wired and Wireless Networks Integration A portal is the logical point at which packets from a non LAN (e.g., Ethernet) enter the DS. It is possible for one device to offer both the functions of an AP and a portal. (E.g., if the DS itself is implemented from Ethernet). Nowadays, what most people say “access point” actually is a portal. This is because access points in today’s markets all connect to an Ethernet

Example: Portal

Architecture Services Station services –Authentication –Deauthentication –Privacy (WEP: wired equivalent privacy) –MSDU delivery Distribution system services –Association (always initiated by the station, not AP) –Disassociation (can be initiated by either AP or station) –Distribution –Integration –Reassociation (always initiated by the station, not AP)

Station States

Frame Types Class 1 Frames –Control Frames Request to send (RTS) Clear to send (CTS) Acknowledgement (ACK) Contention-Free (CF) –Management Frames Probe request/response Beacon Authentication Deauthentication Announcement traffic indication message (ATIM) –Data Frame

Frame Types (cont.) Class 2 Frames –Management frames Association request/response Reassociation request/response Disassociation Class 3 Frames –Data frames –Management frames Deauthentication –Control Frames Power save poll

MAC Generic Frame Format

Frame Types

Frame Subtypes

Other fields in the Frame Control Field To DS: set to 1 if the frame is destined for the DS. (I.e., the frame is from a station to a host on an Ethernet) From DS: set to 1 if this frame is from the DS. (I.e., the frame is from a host on an Ethernet to a station)

Other fields in the Frame Control Field More fragment: set to 1 if another fragment of the same frame will follow in a subsequent frame. Retry: set to 1 if this frame is a retransmission of an earlier frame. Power management : set to 1 to indicate that this station will be in a sleep mode. More data: If a station has additional frames to send to a station that is in sleep mode, then the sending station will place 1 in this field. WEP: set to 1 to indicate that the frame body has been encrypted using the WEP algorithm. Order: set to 1 to indicate the receiving station that frames must be processed in order

The Duration Field The unit of duration is microsecond. This field can be used by RTS/CTS/DATA frames to reserve the wireless channel for a period of time

Address Types Destination address (DA): The final destination address of the MAC service data unit (MSDU). Source address (SA): The address of the MAC entity that initiated the MSDU transmission. Receiver address (RA): The address of the access point that is to receive the frame next. Transmitter address (TA): The address of the immediate preceding access point sending the frame. BSSID: This is the ID of a BSS. In an infrastructure BSS, this is the MAC address of the station in the access point. In an IBSS, this is a locally administered address formed from a random number. An address filed may contain DA, SA, RA, TA, BSSID

The Sequence Control Field Sequence number is used to detect duplicate frames. (There is a per-source cache (address 2, seq#, frag#) for each source station.) A frame can be fragmented into several fragments to reduce the frame-error-rate that it may experience over lossy wireless links. The fragment threshold is a parameter and can be configured

MAC Layer Functional Descriptions

MAC Architecture DCF is a distributed contention scheme. (called CSMA/CA, every station must support it.) PCF is a centralized polling scheme. (Optional. Actually no access points currently support it.)

DCF Provides Priority When the medium becomes idle, Because DCF asks different types of frames to wait a different amount of time before they can be sent to the medium, DCF can provide three priority levels for different types of frames. Data Frame Control Frame (e.g., RTS/CTS/ACK) PCF Frame

DCF Basic Access Method If a station wants to send a frame and the medium is currently busy, the station should defer its transmission until the medium becomes idle

DCF Basic Access Method Then it should wait a period of time equal to DIFS. If during this DIFS time the medium is idle, then the station should start a backoff timer. –Otherwise, the DIFS timer should be canceled and later restarted when the medium again becomes idle. When the station’s backoff timer expires, the station then can send its frame onto the medium. –But, the backoff timer should be suspended whenever the medium is busy

Backoff Procedure Suspend the backoff timers if a transfer is going on. When the medium becomes idle, resume the backoff timer only after DIFS idle time

performs a link-level ACK scheme. Depending on frame sizes, a frame can be retransmitted up to 4 or 7 times. If the ACK is not received within a certain time but a valid frame is received, the data transmission is deemed failed. However the received valid frame can be processed. ACK Procedure Retransmit timer expires here

Exponential Backoff The CW will be exponentially increased for successive failed transmissions. CW will be reset to CWmin immediately after a successful transmission, or the number of retransmission has exceeded a certain value

Use of Network Allocation Vector (NAV) NAV is used to reserve the medium. It is used in RTS/CTS/Data/ACK frames to avoid the hidden-terminal problem

Fragment Transmission without RTS/CTS It is SIFS, not DIFS. Therefore, the transmissions of all of the fragments of a frame can be finished before another station transmits a frame onto the medium (because it need to wait DIFS idle time) If a fragment is lost, only the lost fragment is retransmitted, rather than the whole frame

Fragment Transmission with RTS/CTS The duration fields in the fragment and ACK frames are used to update other stations’ NAVs to reserve the medium for the transmissions of the next pair of fragment and ACK. This duration scheme is always used despite whether the RTS/CTS scheme is used or not

Fragment Lost Handling Because the stations that are close to the sending and receiving stations may hear the NAV update carried in the fragment and ACK frames, they will not attempt to use the medium. The result is that the sending station will seize the medium again. idle seize the medium again

IFS Timing Relationships