Download presentation
Presentation is loading. Please wait.
Published byMadison Lee Modified over 9 years ago
1
1 FSATIE TELECOMMUNICATION WORKSHOP Overview of WiFi Presented by David Johnson Mobile platform technology leader IcomtekCSIR
2
2 Author: D L Johnson Overview of WiFi IEEE 802.11 is extension of Ethernet standard (IEEE 802.3) into wireless communications Allows roaming computers to talk to other devices(peer-to- peer) or connect to wired network
3
3 Author: D L Johnson Overview of WiFi – usage scenarios
4
4 Author: D L Johnson Overview of WiFi – usage scenarios u Hotspots inside coffee shops, airports etc. u Corporate wirelessly enabled LAN’s u Point to point links between access points (even bluetooth access points) u Voice over IP links within residential or business premises boundaries (Operators use VoIP across boundaries) u Video links for telehealth applications u Rural connectivity solutions to connect schools, hospitals and clinics to each other and to the internet
5
5 Author: D L Johnson Overview of WiFi - history u Early 90’s: Many proprietry WLAN systems operating in the 2.4GHz and 900MHz, eg. Lucent WaveLAN u 1990: IEEE802 standards committee formed the 802.11 Wireless LAN working group u Jul 26, 1997: IEEE approved the 802.11 standard which was published on 18 November, 1997 u 1998: Several manufactures began manufacturing 802.11 compliant wireless cards capable of 1,2 Mbps links u 1999: IEEE approved 802.11 a and 802.11b standard +802.11b extended datarate to 11 Mbps using DSSS +802.11a extended datarate to 54 Mbps using OFDM in 5GHz band u 2001, the FCC announced new rules allowing additional modulations such as OFDM in the 2.4GHz u 2002: 802.11g released to create 802.11a equivalent in 2.4GHz band
6
6 Author: D L Johnson Overview of Wifi - context u The IEEE 802 group +IEEE 802.1™ Bridging & Management Bridging & Management +IEEE 802.2™: Logical Link ControlLogical Link Control +IEEE 802.3™: CSMA/CD Access MethodCSMA/CD Access Method +IEEE 802.4™: Token-Passing Bus Access Method Token-Passing Bus Access Method +IEEE 802.5™: Token Ring Access MethodToken Ring Access Method +IEEE 802.6™: DQDB Access MethodDQDB Access Method +IEEE 802.7™: Broadband LANBroadband LAN +IEEE 802.10™: SecuritySecurity +IEEE 802.11™: WirelessWireless +IEEE 802.12™: Demand Priority AccessDemand Priority Access +IEEE 802.15™: Wireless Personal Area Networksireless Personal Area Networks +IEEE 802.16™: Broadband Wireless Metropolitan Area NetworksBroadband Wireless Metropolitan Area Networks
7
7 Author: D L Johnson Overview of WiFi – Phycial layer (FHSS) u u Uses 79 separate 1 MHz channels from 2.402-2.480 GHz u u Hops about every 0.1 sec (22 hop pattern, 2.5 hop/sec minimum in US) u u Immune to single frequency noise, has trouble with wideband noise u u Many networks can be located in the same area u u Uses less power to transmit & less expensive to build than DSSS
8
8 Author: D L Johnson Overview of WiFi – Phycial layer (DSSS) u u Signal modulated with a spreading code (11-bit Barker Sequence) u u Uses BPSK for 1Mbps, QPSK for 2Mbps u u All 802.11b compliant products use the same spreading code u u Higher data rates because of “fatter pipe” (about 11 MHz) u u Allows for some single frequency noise & higher wideband noise u u Only allows for 3 networks in same area u u Uses higher power to transmit & more expensive to build than FHSS
9
9 Author: D L Johnson Overview of WiFi – Phycial layer (OFDM) Distributes the data over a large number of carriers that are spaced apart at precise frequencies u Carriers are orthogonal which means that carriers are placed at the nulls in the modulation spectra of each other u Results in high spectral efficiency, resiliency to RF interference, and lower multi-path distortion
10
10 Author: D L Johnson Overview of WiFi – MAC layer u Media Access Control (MAC) layer specification has similarities to the 802.3 Ethernet wired line standard u Standardised across 802.11a/b/g u Uses a protocol scheme known as carrier-sense, multiple access, collision avoidance (CSMA/CA) u Avoids collisions instead of detecting collisions used in 802.3 u RF energy is measured at the antenna and if the received signal strength is below a specified threshold the channel is declared clear u CSMA/CA protocol can use a request to send, clear-to- send, and acknowledge in sequential fashion u Communication is established when one of the nodes sends an RTS frame
11
11 Author: D L Johnson Overview of WiFi – MAC layer u Hidden node +Due to the lack of arbitration between devices communicating with an access point – collisions can occur +RTS/CTS mechanism can be used but most manufactures don’t implemented this in the firmware
12
12 Author: D L Johnson Overview of WiFi – summary of standards
13
13 Author: D L Johnson Overview of WiFi – Actual throughput Technology Transactions per second Mbps of TCP payload throughput Transactional speed relative to 802.11b 11b, 11 Mbps 4795.61.0 11a, 54 Mbps 233627.34,9 11g, 54 Mbps/no protection 233627.34.9 11g, 54 Mbps/CTS- to-self protection 111313.02.3 11g, 54 Mbps/RTS/CTS protection 7508.81.6
14
14 Author: D L Johnson Overview of WiFi – rural connectivity
15
15 Author: D L Johnson Overview of WiFi – rural connectivity
16
16 Author: D L Johnson Overview of WiFi – rural connectivity u Point-to-Multipoint link configuration u Point-to-Point link configuration
17
17 Author: D L Johnson Overview of WiFI – The Future u Combination of 802.11a/b/g in a single chip u Standby power consumption reduced by 10x to enable embedded WiFi solutions depending on batteries u 802.11i security standard to be implemented in new WiFi products u Speeds from 108 Mbps to 300 Mbps proposed for 2005 and referred attentively as 802.11n u Guaranteed QOS for VoIP u UWB could be competition to 802.11 in the future but probably only in many years to come
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.