IEEE 802.11. 802 Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.

Slides:



Advertisements
Similar presentations
Medium Access Control Onno W. Purbo
Advertisements

Contents IEEE MAC layer operation Basic CSMA/CA operation
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Wireless LAN (not assessed) Dr Sandra I. Woolley.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
1 CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
Studying st lecture ~Overview of IEEE ~ Tadashi YASUMOTO.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
Wireless Networking So we talked about wired networks. What about wireless?
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
.11 Architect. 1 Module contents  IEEE Terminology  IEEE MAC Frames  Basic processes in IEEE networks  Configuration parameters.
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Chapter 5 outline 5.1 Introduction and services
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
IEEE WLAN.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
The structure of the IEEE standard MAC protocol. Introduction It consists of one or more basic service sets (BSS) that are interconnected with a distribution.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Lecture 27 University of Nevada – Reno Computer Science & Engineering Department Fall 2015 CPE 400 / 600 Computer Communication Networks Prof. Shamik Sengupta.
Chapter 15 Wireless LANs 15.# 1
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
MAC for WLAN Doug Young Suh Last update : Aug 1, 2009 WLAN DCF PCF.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
ECEN 489, Prof. Xi Zhang Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 11.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
CWNA Guide to Wireless LANs, Third Edition Chapter 6: Medium Access Control Layer Standards.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Wireless LAN By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal
EA C451 (Internetworking Technologies)
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Chapter 2 Wireless LANS and PANS
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
EEC-484/584 Computer Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks
Basic processes in IEEE networks Configuration parameters
Protocol Details John Bellardo UCSD.
EEC-484/584 Computer Networks
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

IEEE

802 Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month 80 2 IEEE Project 802 define network standards for the physical components of a network (the interface card and the cabling) that are accounted for in the physical and data-link layers of the OSI reference model.

802 IEEE802 The 802 specifications define the ways NICs access and transfer data over physical media. These include connecting, maintaining, and disconnecting network devices.

MAC Sublayer PCF – Point Coordination Function (controlled access) DCF – Distributed Coordination Function (random access)

802-Categories 802.1Sets Internetworking standards related to network management Defines the general standard for the data-link layer. The IEEE divides this layer into two sublayers: the LLC and MAC layers (discussed in the previous lesson). The MAC layer varies with different network types and is defined by standard IEEE Defines the MAC layer for bus networks that use Carrier-Sense Multiple Access with Collision Detection (CSMA/CD). This is the Ethernet Standard Defines the MAC layer for bus networks that use a token-passing mechanism (Token Bus LAN) Defines the MAC layer for token ring networks (Token Ring LAN) Defines wireless network standards.

Configuration  Access-Point (AP) Architecture :  Stations select an Access-Point and “associate with it  Access-Points :  Support roaming  Provide time synchronization functions (beaconing)  Provide Power Management support  Traffic typically flows through Access-Point

BSS(Basic Service Set) BSS A set of stations controlled by a single “Coordination Function” (=the logical function that determines when a station can transmit or receive)

IBSS  Independent Basic Service Set (IBSS):  A Basic Service Set (BSS) which forms a self-contained network in which no access to a Distribution System is available  A BSS without an Access-Point  One of the stations in the IBSS can be configured to “initiate” the network and assume the Coordination Function

IBSS

802 Extended Service Set (ESS): A set of one or more Basic Service Sets interconnected by a Distribution System (DS) Traffic always flows via Access-Point Distribution System (DS): A system to interconnect a set of Basic Service Sets – Integrated; A single Access-Point in a standalone network – Wired; Using cable to interconnect the Access-Points – Wireless; Using wireless to interconnect the Access-Points

BSS Distribution System Extended Service Set( With wired distribution system)

BSS Distribution System Extended Service Set( With wireless distribution system)

IEEE defines two MAC sublayers:  the distributed coordination function (DCF).  and point coordination function (PCF). MAC Sublayer

 Distributed Coordination Function (DCF)  Distributed access protocol  Contention-Based  Makes use of CSMA/CA rather than CSMA/CD for the following reasons:  Wireless LANs cannot implement CSMA/CD for three reasons:  1. For collision detection a station must be able to send data and receive collision signals at the same time( costly stations and increased bandwidth requirements).  2. Collision may not be detected because of the hidden station problem.  3. The distance between stations may result in Signal fading which prevent a station at one end from hearing a collision at the other end.  Suited for ad hoc network and ordinary asynchronous traffic MAC Sublayer

Wireless Medium Access-CSMA/CA RTS/CTS Mechanism Node wants to send data, first request to receiver for sending data. Send A RTS packet. Receiver reply by sending CTS(Clear to Send) packet. This packet include duration of communication. Other node receiving CTS will defer their transmission for duration of communication.

CSMA/CA Sender Receiver RTS CTS DATA

CSMA/CA-Hidden Terminal Problem A B C A wants to send data to B. A will Sense channel, it finds channel free and start sending data. C also wants to send data to B. C will sense channel and finds channel free and start sending. Both signal reach Node B and collide. Collision not detected.

CSMA/CA-Hidden Terminal Problem A B C A wants to send data to B. A will send RTS to B. RTS

CSMA/CA-Hidden Terminal Problem A B C A wants to send data to B. A will send RTS to B. B will received RTS and Reply to A that you can transmit data by sending CTS. CTS packet also include duration of this communication. CTS CTS packet reach A and C both. C check CTS packet and learn that B going to start communication with A for Duration mentioned in packet.

CSMA/CA-Hidden Terminal Problem A B C A wants to send data to B. A will send RTS to B. B will received RTS and Reply to A that you can transmit data by sending CTS. CTS packet also include duration of this communication. Data CTS packet reach A and C both. C check CTS packet and learn that B going to start communication with A for Duration mentioned in packet. A receive CTS and finds that it can transmit data.

Point Coordination Function (PCF)  an optional access method on top of DCF  Implemented in an infrastructure network (not in an ad hoc network).  Contention-Free  mostly for time-sensitive transmission services like voice or multimedia.  The AP performs polling stations one after another, sending any data they have to the AP. MAC Sublayer

To give priority to PCF over DCF, another set of interframe spaces has been defined:  SIFS - Short Inter Frame Spacing  Used for immediate response actions e.g ACK, CTS  PIFS - Point Inter Frame Spacing  PIFS (PCF IFS) is shorter than the DIFS. if, at the same time, a station wants to use only DCF and an AP wants to use PCF, the AP has priority. MAC Sublayer

Repetition interval has been designed to cover both contention-free (PCF) and contention-based (DCF) traffic to allow DCF accessing the media. The repetition interval starts with control frame, called a beacon frame. When the stations hear the beacon frame, they start their NAV for the duration of the contention-free period of the repetition interval. MAC Sublayer

repetition interval used by the PC (point controller) stations. At the end of the contention-free period, the PC sends a CF end (contention-free end) frame to allow the contention- based stations to use the medium. MAC Sublayer

WLAN Terminology-SSID Service Set Identifier (SSID):  “Network name”  32 octets long  One network (ESS or IBSS) has one SSID

BSSID Basic Service Set Identifier (BSSID)  “cell identifier”  6 octets long (MAC address format)  One BSS has one SSID  Value of BSSID is the same as the MAC address of the radio in the Access-Point

Frame Formats MAC Header format differs per Type: – Control Frames (several fields are omitted) – Management Frames – Data Frames Frame Control Duration ID Addr 1Addr 2Addr 3Addr 4 Sequence Control CRC Frame Body MAC Header Bytes: Protocol Version TypeSubType To DS Retry Pwr Mgt More Data WEPRsvd Frame Control Field Bits: DS FromMore Frag Frame Format

Address Field Description Address 1 always the address of the next device. Address 2 is always the address of the previous device. Address 3 is the address of the final destination station if it is not defined by address1. Address 4 is the address of the original source if it is not same as address 2. Protocol Version TypeSubType To DS Retry Pwr Mgt More Data WEPRsvd Frame Control Field Bits: DS FromMore Frag To DS From DS Address 1 DA BSSID RA Address 2 SA BSSID SA TA Address 3 BSSID SA DA Address 4 N/A SA Address Fields Description

Address mechanism

Type field descriptions Type and subtype identify the function of the frame: Type=00Management Frame Beacon (Re)Association Probe (De)Authentication Power Management Type=01Control Frame RTS/CTS ACK Type=10Data Frame Protocol Version TypeSubType To DS Retry Pwr Mgt More Data WEPRsvd Frame Control Field Bits: DS FromMore Frag Type Field Description

DIFS Contention Window Slot time Defer Access Backoff-Window Next Frame Select Slot and Decrement Backoff as long as medium is idle. SIFS PIFS DIFS Free access when medium is free longer than DIFS Busy Medium Inter frame spacing required for MAC protocol traffic – SIFS = Short interframe space – PIFS = PCF interframe space – DIFS = DCF interframe space Back-off timer expressed in terms of number of time slots Inter-Frame Spacing

Ack Data Next MPDU Src Dest Other Contention Window Defer Access Backoff after Defer DIFS SIFS DIFS Acknowledgment are to arrive at within the SIFS The DCF interframe space is observed before medium is considered free for use Data Frames and Their ACK

MAC Management Frames Beacon – Timestamp, Beacon Interval, Capabilities, SSID, Supported Rates, parameters – Traffic Indication Map Probe – SSID, Capabilities, Supported Rates Probe Response – Timestamp, Beacon Interval, Capabilities, SSID, Supported Rates, parameters – same for Beacon except for TIM

MAC Management Frames (cont’d) Association Request – Capability, Listen Interval, SSID, Supported Rates Association Response – Capability, Status Code, Station ID, Supported Rates Re-association Request – Capability, Listen Interval, SSID, Supported Rates, Current AP Address Re-association Response – Capability, Status Code, Station ID, Supported Rates

MAC Management Frames (cont’d) Dis-association – Reason code Authentication – Algorithm, Sequence, Status, Challenge Text De-authentication – Reason

Assignment 1.Prepare a comparative study on a/b/g 2.Explain exposed terminal and it’s solution. 3.Compare DSR, AODV and DSDV 4.

802