14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Slides:



Advertisements
Similar presentations
Chapter 14 무선 LAN (Wireless LAN).
Advertisements

14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Networks: Wireless LANs1 Wireless Local Area Networks.
Contents IEEE MAC layer operation Basic CSMA/CA operation
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Wireless LAN (not assessed) Dr Sandra I. Woolley.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Network Technology CSE Network Technology CSE3020 Week 9.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
Wireless Networking So we talked about wired networks. What about wireless?
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Introduction to Wireless Networks Michalis Faloutsos.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Chapter 5 outline 5.1 Introduction and services
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
1 Kyung Hee University Chapter 15 Wireless LANs. 2 Kyung Hee University IEEE 802 Standards Working Groups WiMAX, an acronym that stands for Worldwide.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Chapter 15 Wireless LANs 15.# 1
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 13 Wired LANs: Ethernet
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Wireless LAN By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal
SSN College of Engineering
Chapter 15 Wireless LANs.
The University of Adelaide, School of Computer Science
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Chapter 3 Wireless LANs This work is licensed under the Creative Commons Attribution-NonCommercial 4.0 International License. To view a copy of this.
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 15 Wireless LANs.
Protocol Details John Bellardo UCSD.
Introduction to Wireless Networks
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
ECSE-4730: Computer Communication Networks (CCN)
Introduction Wireless communication is one of the fastest-growing technologies The demand for connecting devices without the use of cables is increasing.
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IEEE Wireless Local Area Networks (RF-LANs)
Wireless LANs.
Presentation transcript:

14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

IEEE IEEE has defined the specifications for a wireless LAN, called IEEE , which covers the physical and data link layers. Architecture MAC Sublayer Physical Layer Topics discussed in this section:

Architecture Provide two kinds of services The Basic Service Set (BSS) The Extended Service Set (ESS) The Basic Service Set Made up of stationary or mobile wireless station and the access point (AP) The BSS is categories by without AP and with AP 14.3

14.4 A BSS without an AP is called an ad hoc network; a BSS with an AP is called an infrastructure network. Note

The BSS without AP This is a stand-alone network Cannot send a data among BSSs They can locate one another and agree to be part of a BSS 14.5

14.6 Figure 14.1 Basic service sets (BSSs)

Extended Service Set Made up of two or more BSSs with APs The BSS are connected through a distribution system The distribution system connect APs in the BSSs The stations can be Mobile – normal station in a BSS Stationary – refers as AP stations where it is part of wired LAN 14.7

14.8 Figure 14.2 Extended service sets (ESSs)

Station Types IEEE defines three types based on mobility in a wireless LAN : No transition Not moving Moving only inside a BSS BSS-transition Move from one BSS to another BUT the movement is inside one ESS ESS-transition Move from one ESS to another 14.9

MAC Sublayer IEEE defines two MAC Sublayers DCF (Distributed Coordination Function) PCF (Point Coordination Function) Figure 14.3 shows the relationship between two MAC sublayers The LLC sublayer The physical layer 14.10

14.11 Figure 14.3 MAC layers in IEEE standard

DCF (Distribution Coordination Function) Uses CSMA/CA as access method Why not CSMA/CD ? When collision is detected, a station must be able to send and receive a collision signal at the same time. This can mean costly station and increased bandwidth requirements If there are the hidden station problems, a collision may not be detected The distance between stations are great so signal fading could prevent from hearing a collision 14.12

14.13 Figure 14.4 CSMA/CA flowchart

CSMA/CA Flowchart Before sending a frame Uses Persistence strategy with back-off until the channel idle If the channel is idle, wait for a period of time called the DIFS (Distributed Interframe Space) Sends the control frame called the RTS (Request To Send) 14.14

Continue … After received the RTS Waiting a period of time called the SIFS (Short Interframe Space) The destination station sends a control frame called the CTS (Clear To Send) to the source station This control frame indicates the destination station is ready to receive a data 14.15

Continue … After waiting an amount of time equal to SIFS, the source station starts send a data At destination station After waiting an amount of time equal to SIFS, send an acknowledgement** to show the time frame is received **Acknowledgement is the way to inform about arrival packet of data 14.16

14.17 Figure 14.5 CSMA/CA and NAV

NAV (Network Allocation Vector) How do other stations defer sending their data if one station acquires access? In other words, how is the collision avoidance aspect of this protocol accomplished? The key is a feature called NAV

Continue.. When a station send the RTS frame It includes the duration of occupy for the channel This station create a timer called NAV that shows how much time must pass before other stations are allowed to check the channel for idleness Collision during handshaking It is happened during when RTS and CTS are in transition Uses back-off strategy and sender tries again 14.19

PCF (Point Coordination Function) Optional access method and can be implemented in an infrastructure network It is also implemented on top of DCF Mostly used for time-sensitive transmission 14.20

Continue … PCF has a centralised and contention-free polling access The AP performs polling for the stations and the stations sending data to the AP To set priority to PCF, interframe spaces have been defined PIFS – shorter than the DIFS SIFS – Same as that in DIFS Example : at the same time, (1) a station wants use only DCF, (2) AP wants use PCF, so as a result the AP has priority 14.21

Continue … Due to priority of PCF over DCF, stations only use DCF may not access to the medium To prevent this, a repetition interval has been designed to cover Contention-free (PCF) Contention-based (DCF) 14.22

Continue … The repetition interval which is repeated continuously as shown in Figure 14.6 It is start with a special control frame (beacon frame) When the stations hear a beacon frame It starts the NAV during contention-free period 14.23

14.24 Figure 14.6 Example of repetition interval

Continue … During the repetition interval The PC sends a pool frame The PC receives data The PC sends ACK or receives ACK or do any combination of these At the end, the PC sends CF end (contention- free end) frame to allow the contention-based stations use the medium 14.25

Fragmentation A corrupt frame has been retransmitted due to noisy in the wireless environment Therefore, recommends fragmentation of large frame It is more efficient to resend a small frame than a large one 14.26

Frame Format The MAC layer consists of nine fields as shown in Figure 14.7 FC (Frame Control) – defines the type and control information D – defines the duration of the transmission Addresses – defines there are 4 addresses SC (sequence control) – defines sequence number of the frame Frame body – defines the types and subtypes of FC field FCS – defines error detection sequence using CRC-32 scheme 14.27

14.28 Figure 14.7 Frame format

14.29 Table 14.1 Subfields in FC field

Frame Types A wireless LAN defined by IEEE has three categories of frames Management Frames Used for initial communication between stations and APs Control Frames Used for accessing the channel and acknowledging the frame as shown in Figure 14.8 Data Frames Used for carrying data and control information 14.30

14.31 Figure 14.8 Control frames

14.32 Table 14.2 Values of subfields in control frames

Addressing Mechanism Specifies four cases by defining the value of the two flags in the FC field such To DS and From DS as shown in Table 14.3 The interpretation of the four addresses (address 1 to address 4) in the MAC frame depends on the value of these flags Note : Address 1 is always the address of the next device; Address 2 is always the address of the previous devices; Address 3 is the address of the final station if it is not defined by address 1; Address 4 is the address of original source station if it is not same as address

14.34 Table 14.3 Addresses

Case 1 : 00 (refers to Table 14.3) To DS = 0 ; The frame is not going to to a distribution system From DS = 0 ; The frame is not coming from a distribution system The frame is going from one station in a BSS to another without passing through the distribution system as shown in Figure 14.9 (a) 14.35

14.36 Figure 14.9 Addressing mechanisms

Case 2 : 01 To DS = 0 and From DS = 1; the frame is coming from a distribution system (AP) and going to the station (original) The ACK frame should be sent to the AP Note : the address 3 contains the original sender of the frame (in another BSS) as shown in Figure 14.9 (b) 14.37

Case 3 : 10 To DS = 1 and From DS = 0; The frame is going to the distribution system (AP) from the station The ACK frame is sent to the original station Note : Address 3 contains the final destination of the frame (in another BSS) as shown in Figure 14.9 (c) 14.38

Case 4 : 11 To DS = 1 and From DS = 1; The frame is going from one AP to another AP in a wireless distribution system Do not to define addresses if the distribution system is a wired LAN because the frame in these cases has the format of wired LAN frame (Ethernet) Note : need four addresses to define the original sender, the final destination and two intermediate APs as shown in Figure 14.9 (d) 14.39

Hidden and Exposed Station Problems Based on Figure 14.10, Station A can hear a signal transmitted by B or C Assume; Station B is sending a data to station A In the middle, station C also sends data to station A However, station C is out of B’s range and transmission from B cannot reach C Therefore, C thinks the medium is free Station C sends data to A which results in a collision at A because station A receiving data from both B and C 14.40

14.41 Figure Hidden station problem 1 2

Continue … In this case, station B and C are hidden between each other with respect to A Hidden stations can reduce the capacity of the network because of the possibility of collision The solution is the handshake frames (RTS and CTS) as shown in Figure where the RTS message from B reaches A but not C Station C knows some hidden station is using the channel and refrains from transmitting until duration is over 14.42

14.43 The CTS frame in CSMA/CA handshake can prevent collision from a hidden station. Note

14.44 Figure Use of handshaking to prevent hidden station problem

Exposed Station Problem In this problem, a station is refrain from using a channel when it is available Figure shows station A is transmitting to station B Station C has a data to send to station D which can be sent without interfering with the transmission from A to B However, station C is exposed to transmission from A; station C hears what A is sending and refrains from sending Station C is too conservative and wastes the capacity of the channel 14.45

14.46 Figure Exposed station problem

Handshaking Station C hears the RTS from A but does not hear the CTS from B Station C, after hearing the RTS from A, can wait for a time so that the CTS from B reaches A It then sends the RTS to D to show that it needs to communicate with D Both station B and A may hear this RTS but station A is in the sending state, not the receiving state Station B, however, responds with a CTS 14.47

Continue …. The problem begun, if station A has started sending its data Station C cannot hear the CTS from station D because of the collision Station C cannot send its data to D Station C remains exposed until A finishes sending its data as shown in Figure

14.49 Figure Use of handshaking in exposed station problem

Physical Layer Except the infrared, all implementations are operate in the industrial, scientific and medical (ISM) band which defines three unlicensed bands in the three ranges MHz – GHz – GHz See Figure

14.51 Table 14.4 Physical layers

14.52 Figure Industrial, scientific, and medical (ISM) band

BLUETOOTH Bluetooth is a wireless LAN technology designed to connect devices of different functions such as telephones, notebooks, computers, cameras, printers, coffee makers, and so on. A Bluetooth LAN is an ad hoc network, which means that the network is formed spontaneously. Architecture Bluetooth Layers Baseband Layer L2CAP Topics discussed in this section:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Architecture Defines two type of networks Piconet Scatternet 14.54

Piconet It is also called small net Its can have up to 8 stations One primary, the rest are secondary Communication can be one-to-one or one- to-many 14.55

Continue.. An additional eight secondaries can be in the “parked state” A secondary in a “parked state” is synchronised with the primary but cannot take part in communication until it is moved from the “parked state” ONLY eight stations can be active To activate a station from the “parked state”, an active station must go to the “parked state” 14.56

14.57 Figure Piconet

Scatternet It has been formed by the combinations of piconet A secondary station in one piconet can be the primary in another piconet This station can receive messages from the primary in the first piconet (as a secondary) and acting as a primary, deliver them to secondaries in the second piconet A station can be a member of two piconets 14.58

14.59 Figure Scatternet