Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless & Personal Communication Systems – CSE5807 Lecture: 06 1 Wireless Personal Communications Systems – CSE5807 Lecture: 06 Stephen Giles and Satha.

Similar presentations


Presentation on theme: "Wireless & Personal Communication Systems – CSE5807 Lecture: 06 1 Wireless Personal Communications Systems – CSE5807 Lecture: 06 Stephen Giles and Satha."— Presentation transcript:

1 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 1 Wireless Personal Communications Systems – CSE5807 Lecture: 06 Stephen Giles and Satha K. Sathananthan School of Computer Science and Software Engineering Monash University Australia Modified by Peter Granville August 2006 These slides contain figures from Stallings, and are based on a set developed by Tom Fronckowiak.

2 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 2 Wireless LAN Application Areas LAN Extension: –In number of environments, there is a role for the WLAN: Buildings with large open spaces – manufacturing plants, warehouses Historical buildings with insufficient twisted pair and where drilling holes for new wiring is prohibited Small offices where installation and maintenance of wired LANs is not economical –In most cases an organization also has a Wired LAN. Typically the WLAN is linked into a wired LAN on same premises – LAN Extension –Fig 13.1, 13.2 Stallings 2E, 1E

3 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 3 Wireless LAN Application Areas Cross-building interconnect: –To connect LANs in nearby buildings. Connecting wired or wireless LANs by point-to-point wireless link. –Devices connected are typically bridges or routers. Nomadic Access: –Wireless link between LAN hub and mobile data terminal equipped with antenna –Useful in an extended environment such as a campus or a business operating out of a cluster of buildings

4 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 4 Wireless LAN Application Areas Ad hoc networking: –Temporary peer-to-peer (no centralized server) network set up to meet an immediate need –A group of employees convene a business meeting and link theirs PCs in a temporary network just for the duration of the meeting. –No infrastructure for an ad hoc LAN –Fig 13.3 Stallings 2E, 1E

5 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 5 Wireless LAN AP WAN AP Backbone LAN Router

6 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 6 Wireless LAN Ad hoc networks Infrastructure networks Access Point LAN WAN

7 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 7 Wireless LAN Requirements Throughput –The Media access control protocol should make efficient use of the wireless medium to maximize capacity Number of nodes –May need to support hundreds of nodes across multiple cells Connection to backbone LAN –In most cases, interconnection with stations on a wired backbone LAN is required Service area –Typical cover area diameter 100 to 300m

8 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 8 Wireless LAN Requirements Battery power consumption –Mobile workers use battery powered workstations that need a long battery life –A MAC protocol that requires mobile nodes to monitor access points constantly or engage in frequent handshakes with a base station would be inappropriate –Sleep mode to reduce power consumption Transmission robustness and security –Unless properly designed, WLAN may be interference prone and easily eavesdropped –Must permit reliable transmission in a noisy environment and should provide some level of security from eavesdropping

9 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 9 Wireless LAN Requirements License-free operation –Users would prefer to buy and operate WLAN products without having to secure a license for the frequency band used by the LAN Handoff/roaming –MAC protocol used should enable stations to move from one cell to another Dynamic configuration –The MAC addressing and network management aspects of WLAN should permit dynamic and automated addition deletion and relocation of end systems without disruption to other users.

10 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 10 Wireless LAN Requirements Collocated network operation –As WLANs become more popular, it is likely for two or more to operate in the same area. Interference between the WLANs is possible and may thwart the normal operation of MAC protocol and may allow unauthorized access to a WLAN Kiviat graphs fig 13.4 Stallings 2E, 1E

11 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 11 Wireless LAN Technologies Infrared (IR) Microwave Radio DirectedOmini-directionalDiffused Spread spectrum Narrowband Figs 13.5, 13.6, 13.7, Table13.1 Stallings 2E, 1E

12 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 12 Infrared Data Transmission Techniques Directed Beam Infrared: –Used to create point-to-point links. Range depends on emitted power and degree of focusing. Focused infrared data link can have range of kilometers. Cross-building interconnect between bridges or routers. Ominidirectional: –Single base station (typically mounted on ceiling) within line of sight of all other stations on LAN. Base station broadcasts signal that can be received by infrared transceivers. Infrared transceivers transmit with directional beam aimed at base station. Diffused: –All infrared transmitters focused and aimed at a point on diffusely reflecting ceiling Infrared radiation strikes ceiling and reradiated omnidirectionally. Picked up by all receivers.

13 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 13 Wireless LAN Technologies Infrared - Strengths –Large spectrum available – potentially high data rates –Unregulated worldwide –Diffusely reflected, thus possible to use ceiling (light coloured) reflection to achieve coverage of an entire room –Does not penetrate walls or opaque objects: More easily secured against eaves dropping Separate installation can be operated in every room in a building without interference, enabling construction of very large WLANs –Equipment inexpensive and simple –Uses intensity modulation, so receivers only need to detect the amplitude of the optical signals

14 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 14 Wireless LAN Technologies Infrared – Weaknesses –Many indoor environments experience intense infrared background radiation, this appears as noise at the receiver: Require use of higher power transmitters –Concern for eye safety –Excessive power consumption Limits range

15 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 15 Spread Spectrum LAN Configuration Multiple-cell arrangement –Fig 13.2 Stallings 2E, 1E –Within a cell, either peer-to-peer or hub. Peer-to-peer topology: –No hub –Access controlled with MAC algorithm => CSMA –Appropriate for ad hoc LANs. Hub topology: –Mounted on the ceiling and connected to backbone. –May control access and act as multiport repeater. –Automatic handoff of mobile stations. –Stations in cell either: Transmit to / receive from hub only.

16 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 16 Narrowband Microwave LAN Use of a microwave radio frequency band for signal transmission. Relatively narrow bandwidth. Licensed by FCC in USA: –Licensed within specific geographic areas (radius 28km) to avoid potential interference. –Motorola - 600 licenses in 18-GHz range –Encrypted transmissions prevent eavesdropping. –License holder has a legal right to an interference free data communications channel Unlicensed: –RadioLAN introduced narrowband wireless LAN in 1995. –Uses unlicensed ISM spectrum => Operates at 10 Mbps in the 5.8-GHz band Used at low power (0.5 watts or less). Range = 50 m to 100 m.

17 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 17 License-Free Bands No permission required for bandwidth usage. –No licensing cost. –Limit on power of transmission exists. Risk of interference disrupting the communications, no legal remedy Industrial Scientific Medical (ISM) bands: –900 MHz ISM Band 902 MHz – 928 MHz => Used in wireless home phones and wireless camera systems. –2.4 GHz ISM Band 2.4 GHz – 2.5 GHz => Used by IEEE802.11, IEEE802.11b and IEEE802.11g devices. –5.8 GHz ISM Band 5.725 GHz– 5.875 GHz Unlicensed national Information Infrastructure (UNNI) Bands: –Lower Band 5.15 GHz – 5.25 GHz –Middle Band 5.25 GHz – 5.35 GHz –Upper Band 5.725 GHz – 5.825 GHz

18 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 18 WLAN Organizations Institute of Electrical and Electronic Engineers (IEEE). European Telecommunications Standards Institute (ETSI) The Wi-Fi Alliance Wireless LAN Association (WLANA) Infrared Data Association (IrDA)

19 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 19 WLAN Standards IEEE802.11 family of standards. –IEEE802.11 –IEEE802.11a –IEEE802.11b –IEEE802.11g HiperLAN –HiperLAN 1 –HiperLAN 2 HomeRF

20 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 20 Other IEEE802.11 Standards IEEE802.11c –Define MAC procedure for the bridge operation. IEEE802.11e –Enhance current 802.11 MAC to expand support for applications with QoS requirements. IEEE802.11f –Define procedure for Inter Access Point Protocol (IAPP). IEEE802.11i –Enhance the 802.11 MAC to enhance security and authentication mechanisms.

21 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 21 IEEE 802 Protocol Layers

22 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 22 Protocol Architecture Functions of physical layer: –Encoding/decoding of signals. –Preamble generation/removal (for synchronization). –Bit transmission/reception. –Includes specification of the transmission medium and topology.

23 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 23 Protocol Architecture Functions of medium access control (MAC) layer: –On transmission, assemble data into a frame with address and error detection fields. –On reception, disassemble frame and perform address recognition and error detection. –Govern access to the LAN transmission medium. Functions of logical link control (LLC) Layer: –Provide an interface to higher layers and perform flow and error control.

24 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 24 Separation of LLC and MAC The logic required to manage access to a shared-access medium not found in traditional layer 2 data link control. For the same LLC, several MAC options may be provided.

25 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 25 IEEE 802.11 Services

26 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 26 MAC Frame Format MAC control –Contains MAC protocol information. Destination MAC address Source MAC address Data Cyclic Redundancy Check (CRC)

27 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 27 Logical Link Control Properties not shared by other control protocols: –Must support multi-access, shared-medium nature of the link. –Relieved of some details of link access by MAC layer. LLC Services: –Unacknowledged connectionless service No flow- and error-control mechanisms Data delivery not guaranteed –Connection-mode service Logical connection set up between two users Flow- and error-control provided –Acknowledged connectionless service Cross between previous two Datagrams acknowledged No prior logical setup

28 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 28 IEEE 802.11 Architecture Access point (AP): –MAC protocol by a central coordination function. Basic service set (BSS) : –Stations competing for access to shared wireless medium. –Isolated or connected to backbone distribution system (DS) through AP. Distribution system (DS): –Can be a switch, a wired network or a wireless network. Extended service set (ESS): –Two or more basic service sets interconnected by DS.

29 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 29 IEEE 802.11 Architecture AP WAN AP Backbone LAN Router BSS ESS

30 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 30 IEEE 802.11 Services ServiceProviderUsed to support AssociationDistribution SystemMSDU delivery AuthenticationStation/APLAN access and security DeauthenticationStation/APLAN access and security DisassociationDistribution SystemMSDU delivery DistributionDistribution SystemMSDU delivery IntegrationDistribution SystemMSDU delivery Station/APMSDU delivery PrivacyStation/APLAN access and security ReassociationDistribution SystemMSDU delivery MSDU – MAC Service Data Unit

31 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 31 Distribution of Messages Within a DS Distribution service: –Used to exchange MAC frames from station in one BSS to station in another BSS. Integration service: –Transfer of data between station on IEEE 802.11 LAN and station on integrated IEEE 802.x LAN.

32 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 32 Association-Related Services Before DS can deliver data to or accept data from a station, that station must be associated. Three transition types: –No transition Stationary or moves only within BSS. –BSS transition Station moving from one BSS to another BSS in same ESS. –ESS transition Station moving from BSS in one ESS to BSS within another ESS.

33 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 33 Association-Related Services Association –Establishes initial association between station and AP. Reassociation –Enables transfer of association from one AP to another, allowing station to move from one BSS to another. Disassociation –Association termination notice from station or AP.

34 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 34 Access and Privacy Services Authentication –Establishes identity of stations to each other. Deauthentication –Invoked when existing authentication is terminated. Privacy –Prevents message contents from being read by unintended recipient.

35 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 35 IEEE 802.11 Medium Access Control MAC layer covers three functional areas: –Reliable data delivery –Access control –Security

36 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 36 Reliable Data Delivery More efficient to deal with errors at the MAC level than higher layer (such as TCP). Frame exchange protocol: –Source station transmits data. –Destination responds with acknowledgment (ACK). –If source doesn’t receive ACK, it retransmits frame. Four frame exchange: –Source issues request to send (RTS). –Destination responds with clear to send (CTS). –Source transmits data. –Destination responds with ACK.

37 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 37 Access Control Distributed Foundation Wireless MAC (DFWMAC). Distributed Access: –Attractive for ad hoc network and bursty traffic. –Handled by lower sublayer of the MAC layer, Distributed Coordination Function (DCF). –Use CSMA. –Ordinary asynchronous traffic directly uses DCF. –DCF includes a set of delays to provide priority scheme. Optional Centralized Access: –Point Coordination Function (PCF) provides contention free service. –PCF is built on top of DCF.

38 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 38 Access Control

39 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 39 Medium Access Control Logic

40 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 40 Interframe Space (IFS) Values Short IFS (SIFS): –Shortest IFS –Used for immediate response actions. Acknowledgment (ACK) Clear to send (CTS) Poll response Point coordination function IFS (PIFS): –Midlength IFS. –Used by centralized controller in PCF scheme when using polls. –Takes precedence over normal contention traffic. Distributed coordination function IFS (DIFS): –Longest IFS –Used as minimum delay of asynchronous frames contending for access –Used for all ordinary asynchronous traffic.

41 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 41 Communication Process BeaconContention-Free Period (PCF Mode) Contention Period (DCF Mode) Superframe AP seizes control of medium here. PIFS DIFSContention Period time Stations in DCF mode contend for access here.

42 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 42 MAC Frame Format

43 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 43 Control Frames Power save – poll (PS-Poll) Request to send (RTS) Clear to send (CTS) Acknowledgment Contention-free (CF)-end CF-end + CF-ack Data Frames Data-carrying frames –Data –Data + CF-Ack –Data + CF-Poll –Data + CF-Ack + CF-Poll

44 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 44 Management Frame Beacon Probe request Probe response Authentication Deauthentication Association request Association response Reassociation request Reassociation response Dissociation Announcement traffic indication message

45 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 45 IEEE 802.11 MAC Protocol A protocol is needed to define rules for all stations to access the common channel without conflict. Many proposals were submitted to IEEE 802.11 working group, CSMA/CA was chosen (1997). CSMA/CA is similar to CSMA/CD (used in Ethernet). A station must make sure the common channel is clear before any transmission attempt. Unlike CSMA/CD (Ethernet), a station cannot detect a collision. The receiver must reply with an acknowledgement immediately after receiving a frame. A station must choose a random future time for all its transmission (new or collided frames).

46 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 46 CSMA/CA To transmit a frame, a station first picks a random integer, r (or counter) from range [0,W-1]. The value r is decreased by one when the common channel is detected idle for a short period of time known as slot time (e.g. 50  sec). The station transmits the frame when r reaches zero. If the channel is detected busy before r reaches zero, the station stops decreasing r. The countdown will be reactivated when a long period of idle channel is detected (this period is known as DIFS – Distributed Interframe Space). After the completion of the transmission, the station must wait for a very short period (known as SIFS – Short IFS) for the acknowledgement (ack). The return of the ack confirms the transmission, otherwise, the station must repeat the first step.

47 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 47 Ack not received transmission completed Channel turns busy CSMA/CA The station transmits the frame To transmit a frame, a station first picks a random integer, r (or counter) from range [0,W-1] The r value is frozen. The station will continue to monitor the channel. The countdown will be reactivated when a long period of idle channel is detected (known as DIFS) the station must wait for a very short period (known as SIFS) for an acknowledgement (ack). For every slot time (eg. 50  sec) where the common channel is sensed idle, r =r-1 when r =0 channel turns idle for a DIFS START DONE ack received REPEAT START

48 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 48 CSMA/CA Initially, W is set to a small value (W=8 according to the IEEE 802.11 standard, this is known as the “minimum contention window”). As a station experiences collision, W is doubled. When W reaches a large value, it stays at that value (W=256 according to the IEEE 802.11 standard, this is known as the “maximum contention window”).

49 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 49 CSMA/CA Operation: Example-1 B D C Consider this ad hoc WLAN: Scenario: B is attempting to transmit a frame to D. The transmission is successful. time B was ready, B picked r = 3 r = 0 B transmitted its frame ACK from D Slot time SIFS

50 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 50 CSMA/CA Operation: Example-2 B D C Consider this ad hoc WLAN: Scenario: B, C are attempting transmissions to D. Both transmissions are successful. time B transmitted its frame. C detected a busy channel, r c was frozen. ACK from D Slot time B, C are ready, B picked r B = 1 and C picked r c = 3 DIFS r c was reactivated C transmitted its frame here when r c = 0.

51 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 51 CSMA/CA Operation: Example-3 Scenario: B, C are attempting transmissions to D. A collision occurs before both transmissions are successful. time Transmissions of B and C collided here. Slot time B, C are ready, B picked r B = 1 and C picked r c = 1 No ACK from D DIFS B, C repeated the operation. B picked r B = 1 and C picked r c = 13 B transmitted its frame here when r B =0. r c was frozen here. ACK from D... B D C

52 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 52 Hidden Station Problem When A is transmitting a frame to B, since D is not in A’s coverage, D is a hidden station that D doesn’t sense a busy channel, thus D may starts a transmission that collides with A’s transmission Hidden Station Problem in ad hoc Wireless LANs: ABCD A’s coverage B’s coverage

53 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 53 Exposed Station problem While A is transmitting a frame to C, B senses a busy channel and concludes that it may not transmit any frame to D which is incorrect Exposed Station Problem in ad hoc Wireless LANs: ABCDA’s coverage B’s coverage

54 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 54 Solution to Hidden/Exposed Station Problem Four-way Handshaking time senderreceiver data ACK Basic operation Additional operation RTS CTS RTS: Ready to send CTS: Clear to send

55 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 55 RTS/CTS Operation B D C Consider this ad hoc WLAN: Scenario: B is attempting to transmit a frame to D. The transmission is successful. time B was ready, B picked r = 3 r = 0 B transmitted its frame after receiving CTS ACK from D Slot time B transmitted RTS D replied with CTS

56 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 56 Handshaking The handshaking access method is an optional operation in IEEE 802.11. It is also used to improve performance (by reducing the bandwidth wastage due to a collision). Short frames are transmitted using Basic access method, and long frames are recommended to transmit using the handshaking access method.

57 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 57 IEEE 802.11: DCF & PCF SIFS PIFS DIFS SIFS = Short Interframe space PIFS = Point IFS DIFS = Distributed IFS PCF (optional) DCF SIFS PDataPC DIFS PCF Operation: PIFS time Backoff DataBusy SIFS PIFS time

58 Wireless & Personal Communication Systems – CSE5807 Lecture: 06 58 Required Reading W. Stallings, “ Wireless Communications and Networks ” Prentice-Hall, 2E and 1E >> Chapter 13 & 14 Reference K. Pahlavan and K. Krishnamurthy “Principles of Wireless Networks”, Prentice-Hall, 2002.


Download ppt "Wireless & Personal Communication Systems – CSE5807 Lecture: 06 1 Wireless Personal Communications Systems – CSE5807 Lecture: 06 Stephen Giles and Satha."

Similar presentations


Ads by Google