WLAN.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Medium Access Issues David Holmer
Networks: Wireless LANs1 Wireless Local Area Networks.
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Wireless LAN Technology
1 6/11/ :41 Chapter 10Wireless LANs1 Rivier College CS575: Advanced LANs Chapter 10: Wireless LANs.
Network Technology CSE Network Technology CSE3020 Week 9.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
Wireless Networking So we talked about wired networks. What about wireless?
Networks: Wireless LANs1 Wireless Local Area Networks.
Wireless Local Area Networks
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Networks: Wireless LANs1 Wireless Local Area Networks.
MAC Protocol By Ervin Kulenica & Chien Pham.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
IEEE 802 Series LAN/MAN Bridging & Management Logical Link Control CSMA/CD (Ethernet) Token Bus Token Ring Wireless.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
ECE 4450:427/527 - Computer Networks Spring 2015
Chapter 11: Wireless LANs Business Data Communications, 6e.
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Wireless LANs and PANs : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Planning and Analyzing Wireless LAN
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Wireless MAC.
Communication Networks: Technology & Protocols
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Mobile and Wireless Networking
CS 457 – Lecture 7 Wireless Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Wireless LAN Simulation IEEE MAC Protocol
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

WLAN

What is 802.11? A family of wireless LAN (WLAN) specifications developed by a working group at the Institute of Electrical and Electronic Engineers (IEEE) Versions: 802.11a, 802.11b, 802.11g, 802.11e, 802.11f, 802.11i

WLANs – 802.11 Protocol Architecture Physical Layer (PHY) Distributed Coordination Function (DCF) Point Coordination Function (PCF) Normal Data Traffic (Asynchronous) Real Time Traffic MAC

IEEE 802.11 - Physical Medium Specification Three Physical Media: INFRARED Narrowband Microwave Spread Spectrum

Infrared Infrared signals used to transmit data (similar to TV remotes!) Higher data rates possible (than spread spectrum) Line of sight point-to-point configuration required (or reflection surface will reflects signals) Too sensitive to obstacles. 10 m maximum range with no sunlight or heat interfere

Narrowband Microwave Typically used to link two WLANs together (for example, to link WLANs in two buildings) Microwave dishes required at both ends of link Unlike spread spectrum which operates in the unlicensed ISM band, narrowband microwave requires FCC licensing Exclusive license typically effective within a 17.5 mile radius

Spread Spectrum Distributed signals over multiple frequencies (to avoid eavesdropping or jamming) Frequency Hopping Spread Spectrum (FHSS) Sender transmits over a seemingly random series of frequencies Intended receiver aware of sequence of frequencies and hops accordingly Allows the coexistence of multiple networks in the same area by using different hopping sequences Direct Sequence Spread Spectrum (DSSS) DS systems use a carrier that remains fixed to a specific frequency band. The data signal is spread onto a much larger range of frequencies (at a much lower power level) using a specific encoding scheme.

Wireless LAN Classification Infrared (IR) LANs An individual cell of an IR LAN is limited to a single room, since infrared light does not penetrate opaque walls. Spread Spectrum LANs In most cases these LANs operate in the ISM (industrial, scientific, and medical) bands, so no FCC licensing is required for their use in the United States. Narrowband Microwave LANs These LANs operate at microwave frequencies but do no use spread spectrum. Some of these products operate at frequencies that require FCC licensing; others use one of the unlicensed ISM bands.

IEEE 802.11 Medium Access Control MAC layer covers three functional areas: Reliable data delivery Access control Security

Reliable Data Delivery Loss of frames due to noise, interference, and propagation effects Frame exchange protocol Source station transmits data Destination responds with acknowledgment (ACK) If source doesn‘t receive ACK, it retransmits frame

Wireless LAN MAC CSMA as Wireless MAC? Hidden and Exposed Terminal Problems make the use of CSMA an inefficient technique

Hidden Terminal Problem Collision A B C A talks to B C senses the channel C does not hear A’s transmission (out of range) C talks to B Signals from A and B collide

Exposed Terminal Problem Not possible A B C D B talks to A C wants to talk to D C senses channel and finds it to be busy C stays quiet (when it could have ideally transmitted)

Hidden and Exposed Terminal Problems Hidden Terminal More collisions Wastage of resources Exposed Terminal Underutilization of channel Lower effective throughput

CSMA - Collision Avoidance CSMA-CA uses short signaling packets for collision avoidance RTS (request to send): a sender request the right to send from a receiver with a short RTS packet before it sends a data packet CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive Signaling packets contain sender address receiver address packet size Variants of this method can be found in IEEE802.11 as DFWMAC (Distributed Foundation Wireless MAC)

Hidden Terminal Revisited … RTS A B CTS C CTS DATA A sends RTS B sends CTS C overheads CTS C inhibits its own transmitter A successfully sends DATA to B

Hidden Terminal Revisited How does C know how long to wait before it can attempt a transmission? A includes length of DATA that it wants to send in the RTS packet B includes this information in the CTS packet C, when it overhears the CTS packet, retrieves the length information and uses it to set the inhibition time

Exposed Terminal Revisited RTS B RTS C D Tx not inhibited CTS Cannot hear CTS B sends RTS to A (overheard by C) A sends CTS to B C cannot hear A’s CTS C assumes A is either down or out of range C does not inhibit its transmissions to D

Collisions Still possible – RTS packets can collide! Binary exponential backoff performed by stations that experience RTS collisions RTS collisions not as bad as data collisions in CSMA (since RTS packets are typically much smaller than DATA packets)

Access Control To deal with these two problems 802.11 supports two modes of access control DCF (Distributed Coordination Function) and PCF (Point Coordination Function). All implementations must support DCF, but PCF is optional.