We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTianna Childrey
Modified about 1 year ago
© 2008 The McGraw-Hill Companies 1 Understanding Wireless Networking
© 2008 The McGraw-Hill Companies 2 Walkie-Talkie Network If you want to understand wireless networking at its simplest level, think about a pair of walkie-talkies. These are small radios that can transmit and receive radio signals. Recall, when you talk into a Walkie-Talkie, your voice is picked up by a microphone, encoded onto a radio frequency and transmitted with the antenna.
© 2008 The McGraw-Hill Companies 3 Walkie-Talkie Network (Cont’d) Another walkie-talkie can receive the transmission with its antenna, decode your voice from the radio signal and drive a speaker. Simple walkie-talkies like this transmit at a signal strength of about 0.25 watts, and they can transmit about 500 to 1,000 feet.
© 2008 The McGraw-Hill Companies 4 Walkie-Talkie Network (Cont’d) In order to do this, we require Each computer is equipped with a walkie-talkie. We would give each computer a way to set whether it wants to transmit or receive. And we would give the computer a way to turn its binary 1s and 0s into two different beeps that the walkie-talkie could transmit and receive and convert back and forth between beeps and 1s/0s.
© 2008 The McGraw-Hill Companies 5 Walkie-Talkie Network (Cont’d) This would actually work. The only problem would be that the data rate would be very slow. A walkie-talkie is designed to handle the human voice (and it's a pretty scratchy rendition at that), so you would not be able to send very much data this way. Maybe 1,000 bits per second. Another problem: the walkie-talkies could not be used to connect to the internet.
© 2008 The McGraw-Hill Companies 6 WiFi’s Radio Technology The radios used in WiFi are not so different from the radios used in walkie-talkies. They have the ability to transmit and receive. They have the ability to convert 1s and 0s into radio waves and then back into 1s and 0s. There are major differences, of course.
© 2008 The McGraw-Hill Companies 7 WiFi’s Radio Technology (Cont’d) WiFi radios that work with the b and g standards transmit at 2.4 GHz, while those that comply with the a standard transmit at 5 GHz. Normal walkie-talkies normally operate at 49 MHz. The higher frequency allows higher data rates. WiFi radios use much more efficient coding techniques (process of converting 0’s and 1’s into efficient radio signals) that also contribute to the much higher data rates.
© 2008 The McGraw-Hill Companies 8 WiFi’s Radio Technology (Cont’d) The radios used for WiFi have the ability to change frequencies. For example, b cards can transmit directly on any of three bands, or they can split the available radio bandwidth into dozens of channels and frequency hop rapidly between them. The advantage of frequency hopping is that it is much more immune to interference and can allow dozens of WiFi cards to talk simultaneously without interfering with each other.
© 2008 The McGraw-Hill Companies 9 WiFi Range Regardless of which setup you use, once you turn your Wireless Access Point on, you will have a WiFi hotspot in your house. In a typical home, this hotspot will provide coverage for about 100 feet (30.5 meters) in all directions, although walls and floors do cut down on the range. Even so, you should get good coverage throughout a typical home. For a large home, you can buy inexpensive signal boosters to increase the range of the Hotspot.
© 2008 The McGraw-Hill Companies 10 Another Way to Amplify WiFi Signals A WiFi repeater is installed to extend coverage. Wireless Access Point
© 2008 The McGraw-Hill Companies 11 How are Multiple Transmitters Supported? Recall the method for supporting multiple transmitter is called the multiple access method. In systems, only one user is allowed to communicate with a receiver at a time (cannot use another frequency channel support a second or third additional user). The way the one user is selected depends on the carrier sense multiple access with collision avoidance (CSMA/CA) random access method.
© 2008 The McGraw-Hill Companies 12CSMA To help illustrate the operation of CSMA, we will use an analogy of a dinner table conversation. Let’s represent our wireless medium as a dinner table, and let several people engaged in polite conversation at the table represent the wireless nodes.
© 2008 The McGraw-Hill Companies 13 CSMA (Cont’d) The term multiple access covers what we already discussed above: When one wireless device transmits, all other devices using the wireless medium hear the transmission, just as when one person at the table talks, everyone present is able to hear him or her. Now let's imagine that you are at the table and you have something you would like to say. At the moment, however, I am talking.
© 2008 The McGraw-Hill Companies 14 CSMA (Cont’d) Since this is a polite conversation, rather than immediately speak up and interrupt, you would wait until I finished talking before making your statement. This is the same concept described in the CSMA protocol as carrier sense. Before a station transmits, it "listens" to the medium to determine if another station is transmitting. If the medium is quiet, the station recognizes that this is an appropriate time to transmit.
© 2008 The McGraw-Hill Companies 15CSMA/CA Carrier-sense multiple access gives us a good start in regulating our conversation, but there is one scenario we still need to address. Let’s go back to our dinner table analogy and imagine that there is a momentary lull in the conversation. You and I both have something we would like to add, and we both "sense the carrier" based on the silence, so we begin speaking at approximately the same time. In terminology, a collision occurs when we both spoke at once.
© 2008 The McGraw-Hill Companies 16 CSMA/CA (Cont’d) The collision will result in an undecipherable message to the intended receivers (listeners). What we need is a polite contention method to get access to the medium; this is the collision avoidance part of CSMA/CA. has come up with two ways to deal with this kind of collision. One uses a two-way handshake when initiating a transmission. The other uses a four-way handshake.
© 2008 The McGraw-Hill Companies 17 2 Way Handshake Node with packet to send monitors channel. If channel idle for specified time interval called DIFS, then node transmits. If channel busy, then node continues to monitor until channel idle for DIFS. At this point, terminal backs-off for random time (collision avoidance) and attempts transmitting after waiting this random amount of time.
© 2008 The McGraw-Hill Companies 18 2 Way Handshake If the node does not back-off the random time, then it will definitely collide with another node that has something to send. Reason for random back-off time is that if I choose a random time and you choose a random time, the probability that we choose the same random time is slim. This way we both back-off transmitting and will therefore will probably not interfere with each other when we are ready to transmit.
© 2008 The McGraw-Hill Companies 19 2 Way Handshake (Cont’d) First way of the 2 way handshake was for the transmitter to send its information packet to the destination node, after following the collision avoidance method described above. If the packet reaches the destination without problems, the destination sends a short packet over the wireless medium acknowledging the correct reception. This packet is typically called an ACK packet. ACK is the second way of the 2 way handshake.
© 2008 The McGraw-Hill Companies 20 4 Way Handshake “Listen before you talk” If medium is busy, node backs-off for a random amount of time after waiting DIFS, just as before. But now, instead of packet, sends a short message: Ready to Send (RTS). This message is basically attempting to inform others that “I have something to send.”
© 2008 The McGraw-Hill Companies 21 4 Way Handshake (Cont’d) RTS contains destination address and duration of message. RTS tells everyone else to back-off for the duration. If RTS reaches the destination okay (no one else collides with this message), the destination sends a Clear to Send (CTS) message after waiting a prescribed amount of time, called SIFS.
© 2008 The McGraw-Hill Companies 22 4 Way Handshake (Cont’d) After getting the CTS, the original transmitter sends the information packet to its destination. In these systems, the transmitter cannot detect collisions. The receiver uses the CRC to determine if the packet reached correctly. If it does then, it sends out an ACK packet. If the information packet not ACKed, then the source starts again and tries to retransmit the packet.
© 2008 The McGraw-Hill Companies 23 4 Way Handshake (Cont’d) Access Point Laptop RTS CTS Data ACK
© 2008 The McGraw-Hill Companies 24 RFID
© 2008 The McGraw-Hill Companies 25 Radio-Frequency Identification and Near-Field Communications Another growing wireless technique is radio frequency identification (RFID). RFID uses thin, inexpensive tags or labels containing passive radio circuits that can be queried by a remote wireless interrogation unit. The tags are attached to any item that is to be monitored, tracked, accessed, located, or otherwise identified.
© 2008 The McGraw-Hill Companies 26 Radio-Frequency Identification and Near-Field Communications The tag is a very thin label-like device into which is embedded a simple passive single-chip radio transceiver and antenna. The chip also contains a memory that stores a digital ID code unique to the tagged item. For the item to be identified, it must pass by the interrogation or reader unit, or the reader must physically go to a location near the item.
© 2008 The McGraw-Hill Companies 27 Radio-Frequency Identification and Near-Field Communications The reader unit sends out a radio signal that may travel from a few inches up to no more than a hundred feet or so. The radio signal is strong enough to activate the tag. The tag rectifies and filters the RF signal into direct current that operates the transceiver.
© 2008 The McGraw-Hill Companies 28 Radio-Frequency Identification and Near-Field Communications This activates a low-power transmitter that sends a signal back to the interrogator unit along with its embedded ID code. The reader checks its attached computer, where it notes the presence of the item and may perform other processing tasks associated with the application.
© 2008 The McGraw-Hill Companies 29 Radio-Frequency Identification and Near-Field Communications Basic concept and components of an RFID system.
© 2008 The McGraw-Hill Companies 30 Radio-Frequency Identification and Near-Field Communications The standard is under the auspices of EPCGlobal, the organization that also standardizes the Electronic Product Code (EPC) used on all tagged items. A key benefit of the new standard is that it is designed to read multiple tags faster. Tag read rates as high as 1500 tags per second are possible. The tags can operate reliably in an environment with multiple readers transmitting and receiving simultaneously.
© 2008 The McGraw-Hill Companies 31 Radio-Frequency Identification and Near-Field Communications Near-Field Communications One of the newest forms of wireless is a version of RFID called near-field communications (NFC). It is an ultrashort-range wireless whose range is rarely more than a few inches. It is a technology used in smart cards and cell phones to pay for purchases or gain admittance to some facilities.
© 2008 The McGraw-Hill Companies 32Reference Shalinee Kishore, LUCID Summer Workshop on Wireless Communications, Lehigh University, July 26-August 3,
WiFi WiFi is the wireless way to handle networking. Wi-fi is a wireless technology that uses radio frequency to transmit data through radio frequency.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
How WiFi Works LUCID Summer Workshop August 3, 2004.
Medium Access Control Nick Feamster CS 4251 Computer Networking II Spring 2008.
CSMA/CA Simulation Course Name: Networking Level(UG/PG): UG Author(s) : Amitendu Panja, Veedhi Desai Mentor: Aruna Adil *The contents in this ppt.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
Wireless Communication Network Lab. Chapter 6 Multiple Radio Access Chih-Cheng Tseng1EE of NIU Prof. Chih-Cheng Tseng
WLAN. What is ? A family of wireless LAN (WLAN) specifications developed by a working group at the Institute of Electrical and Electronic Engineers.
Gursharan Singh Tatla Medium Access Control Sublayer 31-Mar
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Wireless Networking 102. Troubleshooting WLAN Start > Connect To > Show all Connections.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Network Technology CSE Network Technology CSE3020 Week 9.
© 2008 The McGraw-Hill Companies 1 Understanding Wireless Networking.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN A wireless local area network(LAN) is a flexible data communications system implemented.
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
How is Information Transferred? Developing an Intuition for Network Communication Protocols a 6.UAT concept talk by Olga Stroilova.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Wireless Medium Access. Multi-transmitter Interference Problem Similar to multi-path or noise Two transmitting stations will constructively/destructively.
ECE 4450:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr.
14.1 Lecture #2 Chapter 14 Wireless LANs IEEE IEEE has defined the specifications for a wireless LAN, called IEEE , which covers.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
WiFi Networking LUCID Summer Workshop August 2, 2004.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7 Shared Communication Channel Locality of Reference Principle LAN Topologies – Star.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Medium Access Control in Wireless networks. Wireless MAC classification Wireless MAC CentralizedDistributed Guaranteed or controlled access Random access.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Amateur Radio Technician Class Element 2 Course Presentation ELEMENT 2 SUBELEMENTS T1 - FCC Rules, station license responsibilities T2 - Control operator.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
Lecture 5: IEEE ECE 591. IEEE Requirements Wi-Fi often used by the public as a synonym for IEEE wireless LAN (WLAN). Design for.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Understanding Network Architecture CHAPTER FOUR. The Function of Access Methods The set of rules that defines how a computer puts data onto the network.
Cellular Telephones How Do They Work and Are They Safe? Meagan Morrell May 3, 2000.
INTRODUCTION. Electrical and Computer Engineering Concerned with solving problems of two types: Production or transmission of power. Transmission.
INTRODUCTION. Electrical and Computer Engineering Concerned with solving problems of two types: 1. Production or transmission of power.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
© 2017 SlidePlayer.com Inc. All rights reserved.