Introduction to Wireless LAN  Background  Media access principle  Architecture  MAC control  MAC management  PHY layer.

Slides:



Advertisements
Similar presentations
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Advertisements

– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
University of Calgary – CPSC 441
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
Mobile Communications: Wireless LANs Mobile Communications Chapter 7: Wireless LANs  Characteristics  IEEE  PHY  MAC  Roaming  HIPERLAN.
Network Technology CSE Network Technology CSE3020 Week 9.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
WLAN b a Johan Montelius
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Mobile Communications Chapter 3 : Media Access Motivation SDMA, FDMA, TDMA Aloha, reservation schemes Collision avoidance, MACA Polling CDMA, SAMA Comparison.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Ch. 3: Media Access SDMA, FDMA, TDMA Aloha, reservation schemes
Wireless Communications
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Architecture of an infrastructure network
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
1 Module B WLAN – Engineering Aspects Prof. JP Hubaux Mobile Networks
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Mobile Communications Chapter 3 : Media Access
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
An Introduction to Wireless LANs
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
WLAN 1. IEEE Overview Adopted in 1997 Defines: MAC sublayer MAC management protocols and services Physical (PHY) layers – IR – FHSS – DSSS.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Wireless Local Area Networks (WLAN) Part-1: IEEE IT351: Mobile & Wireless Computing Objectives: – To provide a detailed study of the WLAN architecture.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Chapter 2: Wireless LANs
CSE 4215/5431: Mobile Communications Winter 2011
Mobile Communications Chapter 3 : Media Access
Specification overview
Chapter 6 Medium Access Control Protocols and Local Area Networks
CSE 4215/5431: Mobile Communications Winter 2010
CSE 4215/5431: Mobile Communications Winter 2011
Specification overview
Protocol Details John Bellardo UCSD.
Specification overview
Specification overview
Specification overview
Specification overview
Specification overview
Presentation transcript:

Introduction to Wireless LAN  Background  Media access principle  Architecture  MAC control  MAC management  PHY layer

Wireless LAN: Background (15 min)

Wireless LANs Wireless networks today Features and benefits Mobility Flexibility Scalability Wireless LANs: ready now and ready for the future Standards Security Service Roaming

Wireless LAN Basic Service Set (BSS): a single cell controlled by a Base Station (also called Access Point or AP) Distribution System: the interconnection network of base stations Extended Service Set (ESS): the whole interconnected Wireless LAN (seen as a single 802 network), including the different cells, their respective Access Points, and the Distribution System

Radio Frequency In Wireless Networks Radio spectrum Narrowband interference Spread spectrum FHSS – Frequency Hopping Spread Spectrum DSSS – Direct Sequence Spread Spectrum Multi-path interference IEEE series standard : 2M b: 1M, 2M, 5.4M, 11M a: 6M, 9M, 12M, 18M, 24M, 36M, 48M, 54M g: compatible with b and a Other standards: e: provides Quality of Service (QoS) h: supplementary to comply with European regulations i: improved WLAN security

Multipath Effect Multipath radio effect. Transmitter signals are reflected or diffracted by structures, changing the signals’ timing, strength, and quality.

IEEE b Standard b allows unconnected client devices to communicate with an Ethernet network through an RF (Radio Frequency) transmitter that is physically connected to the wired network.

Deploying Wireless LAN Ad-hoc network Association and roaming Deploying access point and wireless LANs Deploying access point Load balancing Channel selection for neighboring wireless LANs Multiple channel rate in a wireless LAN US (FCC)/Canada (IC) 2400 [MHz] channel 1channel 6channel MHz

Wireless LAN: Media Access Principle (20 min)

Media Access Can we apply media access methods from fixed networks? Example CSMA/CD  Carrier Sense Multiple Access with Collision Detection  send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3) Problems in wireless networks  signal strength decreases proportional to the square of the distance  the sender would apply CS and CD, but the collisions happen at the receiver  it might be the case that a sender cannot “hear” the collision, i.e., CD does not work  furthermore, CS might not work if, e.g., a terminal is “hidden”

Hidden terminals  A sends to B, C cannot receive A  C wants to send to B, C senses a “free” medium (CS fails)  collision at B, A cannot receive the collision (CD fails)  A is “hidden” for C Exposed terminals  B sends to A, C wants to send to another terminal (not A or B)  C has to wait, CS signals a medium in use  but A is outside the radio range of C, therefore waiting is not necessary  C is “exposed” to B Motivation - hidden and exposed terminals BAC

Terminals A and B send, C receives  signal strength decreases proportional to the square of the distance  the signal of terminal B therefore drowns out A’s signal  C cannot receive A If C for example was an arbiter for sending rights, terminal B would drown out terminal A already on the physical layer Also severe problem for CDMA-networks - precise power control needed! Motivation - near and far terminals ABC

MACA - collision avoidance MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidance  RTS (request to send): a sender request the right to send from a receiver with a short RTS packet before it sends a data packet  CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive Signaling packets contain  sender address  receiver address  packet size Variants of this method can be found in IEEE as DFWMAC (Distributed Foundation Wireless MAC)

MACA avoids the problem of hidden terminals  A and C want to send to B  A sends RTS first  C waits after receiving CTS from B MACA avoids the problem of exposed terminals  B wants to send to A, C to another terminal  now C does not have to wait for it cannot receive CTS from A MACA examples A B C RTS CTS A B C RTS CTS RTS

Polling mechanisms If one terminal can be heard by all others, this “central” terminal (a.k.a. base station) can poll all other terminals according to a certain scheme  now all schemes known from fixed networks can be used (typical mainframe - terminal scenario) Example: Randomly Addressed Polling  base station signals readiness to all mobile terminals  terminals ready to send can now transmit a random number without collision with the help of CDMA or FDMA (the random number can be seen as dynamic address)  the base station now chooses one address for polling from the list of all random numbers (collision if two terminals choose the same address)  the base station acknowledges correct packets and continues polling the next terminal  this cycle starts again after polling all terminals of the list

Wireless LAN: Architecture (15 min)

Comparison: infrastructure vs. ad-hoc networks infrastructure network ad-hoc network AP wired network AP: Access Point

Architecture of an infrastructure network Station (STA)  terminal with access mechanisms to the wireless medium and radio contact to the access point Basic Service Set (BSS)  group of stations using the same radio frequency Access Point  station integrated into the wireless LAN and the distribution system Portal  bridge to other (wired) networks Distribution System  interconnection network to form one logical network (EES: Extended Service Set) based on several BSS Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA 1 STA 2 STA 3 ESS

Architecture of an ad-hoc network Direct communication within a limited range  Station (STA): terminal with access mechanisms to the wireless medium  Independent Basic Service Set (IBSS): group of stations using the same radio frequency LAN IBSS LAN IBSS 1 STA 1 STA 4 STA 5 STA 2 STA 3

IEEE standard mobile terminal access point fixed terminal application TCP PHY MAC IP MAC PHY application TCP PHY MAC IP MAC PHY LLC infrastructure network LLC

Layers and functions PLCP Physical Layer Convergence Protocol  clear channel assessment signal (carrier sense) PMD Physical Medium Dependent  modulation, coding PHY Management  channel selection, MIB Station Management  coordination of all management functions PMD PLCP MAC LLC MAC Management PHY Management MAC  access mechanisms, fragmentation, encryption MAC Management  synchronization, roaming, MIB, power management PHY DLC Station Management

Wireless LANs: MAC Control (25 min)

MAC layer I - DFWMAC Traffic services  Asynchronous Data Service (mandatory) exchange of data packets based on “best-effort” support of broadcast and multicast  Time-Bounded Service (optional) implemented using PCF (Point Coordination Function) Access methods  DFWMAC-DCF CSMA/CA (mandatory) collision avoidance via randomized „back-off“ mechanism minimum distance between consecutive packets ACK packet for acknowledgements (not for broadcasts)  DFWMAC-DCF w/ RTS/CTS (optional) Distributed Foundation Wireless MAC avoids hidden terminal problem  DFWMAC- PCF (optional) access point polls terminals according to a list

MAC layer II Priorities  defined through different inter frame spaces  no guaranteed, hard priorities  SIFS (Short Inter Frame Spacing) highest priority, for ACK, CTS, polling response  PIFS (PCF IFS) medium priority, for time-bounded service using PCF  DIFS (DCF, Distributed Coordination Function IFS) lowest priority, for asynchronous data service t medium busy SIFS PIFS DIFS next framecontention direct access if medium is free  DIFS

t medium busy DIFS next frame contention window (randomized back-off mechanism) CSMA/CA access method I  station ready to send starts sensing the medium (Carrier Sense based on CCA, Clear Channel Assessment)  if the medium is free for the duration of an Inter-Frame Space (IFS), the station can start sending (IFS depends on service type)  if the medium is busy, the station has to wait for a free IFS, then the station must additionally wait a random back-off time (collision avoidance, multiple of slot-time)  if another station occupies the medium during the back-off time of the station, the back-off timer stops (fairness) slot time direct access if medium is free  DIFS

competing stations - simple version t busy bo e station 1 station 2 station 3 station 4 station 5 packet arrival at MAC DIFS bo e busy elapsed backoff time bo r residual backoff time busy medium not idle (frame, ack etc.) bo r DIFS bo e bo r DIFS busy DIFS bo e busy bo e bo r

CSMA/CA access method II Sending unicast packets  station has to wait for DIFS before sending data  receivers acknowledge at once (after waiting for SIFS) if the packet was received correctly (CRC)  automatic retransmission of data packets in case of transmission errors t SIFS DIFS data ACK waiting time other stations receiver sender data DIFS contention

DFWMAC Sending unicast packets  station can send RTS with reservation parameter after waiting for DIFS (reservation determines amount of time the data packet needs the medium)  acknowledgement via CTS after SIFS by receiver (if ready to receive)  sender can now send data at once, acknowledgement via ACK  other stations store medium reservations distributed via RTS and CTS t SIFS DIFS data ACK defer access other stations receiver sender data DIFS contention RTS CTS SIFS NAV (RTS) NAV (CTS)

Fragmentation t SIFS DIFS data ACK 1 other stations receiver sender frag 1 DIFS contention RTS CTS SIFS NAV (RTS) NAV (CTS) NAV (frag 1 ) NAV (ACK 1 ) SIFS ACK 2 frag 2 SIFS

DFWMAC-PCF I PIFS stations‘ NAV wireless stations point coordinator D1D1 U1U1 SIFS NAV SIFS D2D2 U2U2 SuperFrame t0t0 medium busy t1t1

DFWMAC-PCF II t stations‘ NAV wireless stations point coordinator D3D3 NAV PIFS D4D4 U4U4 SIFS CF end contention period contention free period t2t2 t3t3 t4t4

Frame format Types  control frames, management frames, data frames Sequence numbers  important against duplicated frames due to lost ACKs Addresses  receiver, transmitter (physical), BSS identifier, sender (logical) Miscellaneous  sending time, checksum, frame control, data Frame Control Duration/ ID Address 1 Address 2 Address 3 Sequence Control Address 4 DataCRC bytes Protocol version TypeSubtype To DS More Frag Retry Power Mgmt More Data WEP 2241 From DS 1 Order bits111111

MAC address format DS: Distribution System AP: Access Point DA: Destination Address SA: Source Address BSSID: Basic Service Set Identifier RA: Receiver Address TA: Transmitter Address

Special Frames: ACK, RTS, CTS Acknowledgement Request To Send Clear To Send Frame Control Duration Receiver Address Transmitter Address CRC bytes Frame Control Duration Receiver Address CRC bytes Frame Control Duration Receiver Address CRC bytes ACK RTS CTS

Wireless LANs: MAC Management

MAC management Synchronization  try to find a LAN, try to stay within a LAN  timer etc. Power management  sleep-mode without missing a message  periodic sleep, frame buffering, traffic measurements Association/Reassociation  integration into a LAN  roaming, i.e. change networks by changing access points  scanning, i.e. active search for a network MIB - Management Information Base  managing, read, write

Synchronization using a Beacon (infrastructure) beacon interval t medium access point busy B BBB value of the timestamp B beacon frame

Synchronization using a Beacon (ad-hoc) t medium station 1 busy B1B1 beacon interval busy B1B1 value of the timestamp B beacon frame station 2 B2B2 B2B2 random delay

Power management Idea: switch the transceiver off if not needed States of a station: sleep and awake Timing Synchronization Function (TSF)  stations wake up at the same time Infrastructure  Traffic Indication Map (TIM) list of unicast receivers transmitted by AP  Delivery Traffic Indication Map (DTIM) list of broadcast/multicast receivers transmitted by AP Ad-hoc  Ad-hoc Traffic Indication Map (ATIM) announcement of receivers by stations buffering frames more complicated - no central AP collision of ATIMs possible (scalability?)

Power saving with wake-up patterns (infrastructure) TIM interval t medium access point busy D TTD T TIM D DTIM DTIM interval BB B broadcast/multicast station awake p PS poll p d d d data transmission to/from the station

Power saving with wake-up patterns (ad-hoc) awake A transmit ATIM D transmit data t station 1 B1B1 B1B1 B beacon frame station 2 B2B2 B2B2 random delay A a D d ATIM window beacon interval a acknowledge ATIM d acknowledge data

Power Mode of Wireless NIC Transmit mode  Used during data transmission (sending)  Power consumption: high (e.g., 450mA) Receive mode  Default mode for both data receiving and listening  Power consumption: medium (e.g., 270mA) Sleep mode  Power consumption: low (e.g., 15mA)

Power Saving Mechanism Frame types  Data Frames: used for data transmission  Control Frames: used to control access to the medium  Management Frames: such as Beacon Frame (for synchronization) The Access Point  maintains a continually updated record of the stations currently working in Power Saving mode  buffers the packets addressed to these stations  periodically transmits information (as part of its Beacon Frames) about which Power Saving Stations have frames buffered at the AP The Power Saving Station  wake up periodically (100ms) in order to receive the Beacon Frame  if there are frames stored at the AP waiting for delivery, the station stays awake and sends a Polling message to the AP to get these frames  otherwise goes back sleep

Power Consumed during PS Mode Power consumed by Orinoco Gold NIC during Power Save Mode Power consumed by Cisco AIR-PCM350 NIC during Power Save Mode E cycle (n,t) = 0.060nt , 0 =< n =< 65535

Problems Energy consumption  Wireless networking card consumes a great amount of energy in mobile devices  Over 50% total energy of handheld PC  Up to 10% total energy of laptop PC Networking performance  Highly depends on the signal strength and transmit power  signal attenuation: distance, obstacles, and environment (humidity, temperature, etc)  transmit power levels: 1mW, 5mW, 20mW, 30mW, 50mW, and 100mW for Cisco Aironet 350 NIC Latency  Data transmission time: effective bandwidth, loss rate  Mode transition time: power saving mode – normal mode  AP handoff time

Roaming No or bad connection? Then perform: Scanning  scan the environment, i.e., listen into the medium for beacon signals or send probes into the medium and wait for an answer Reassociation Request  station sends a request to one or several AP(s) Reassociation Response  success: AP has answered, station can now participate  failure: continue scanning AP accepts Reassociation Request  signal the new station to the distribution system  the distribution system updates its data base (i.e., location information)  typically, the distribution system now informs the old AP so it can release resources

Wireless LANs: PHY Layer

Physical layer 3 versions: 2 radio (typ. 2.4 GHz), 1 IR  data rates 1 or 2 Mbit/s FHSS (Frequency Hopping Spread Spectrum)  spreading, despreading, signal strength, typ. 1 Mbit/s  min. 2.5 frequency hops/s (USA), two-level GFSK modulation DSSS (Direct Sequence Spread Spectrum)  DBPSK modulation for 1 Mbit/s (Differential Binary Phase Shift Keying), DQPSK for 2 Mbit/s (Differential Quadrature PSK)  preamble and header of a frame is always transmitted with 1 Mbit/s, rest of transmission 1 or 2 Mbit/s  chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker code)  max. radiated power 1 W (USA), 100 mW (EU), min. 1mW Infrared  nm, diffuse light, typ. 10 m range  carrier detection, energy detection, synchonization

FHSS PHY packet format synchronizationSFDPLWPSFHECpayload PLCP preamblePLCP header variable bits Synchronization  synch with pattern SFD (Start Frame Delimiter)  start pattern PLW (PLCP_PDU Length Word)  length of payload incl. 32 bit CRC of payload, PLW < 4096 PSF (PLCP Signaling Field)  data of payload (1 or 2 Mbit/s) HEC (Header Error Check)  CRC with x 16 +x 12 +x 5 +1

DSSS PHY packet format synchronizationSFDsignalserviceHECpayload PLCP preamblePLCP header variable bits length 16 Synchronization  synch., gain setting, energy detection, frequency offset compensation SFD (Start Frame Delimiter)  Signal  data rate of the payload (0A: 1 Mbit/s DBPSK; 14: 2 Mbit/s DQPSK) Service Length  future use, 00: compliant  length of the payload HEC (Header Error Check)  protection of signal, service and length, x 16 +x 12 +x 5 +1

WLAN: IEEE b Data rate  1, 2, 5.5, 11 Mbit/s, depending on SNR  User data rate max. approx. 6 Mbit/s Transmission range  300m outdoor, 30m indoor  Max. data rate ~10m indoor Frequency  Free 2.4 GHz ISM-band Security  Limited, WEP insecure, SSID Cost  100€ adapter, 250€ base station, dropping Availability  Many products, many vendors Connection set-up time  Connectionless/always on Quality of Service  Typ. Best effort, no guarantees (unless polling is used, limited support in products) Manageability  Limited (no automated key distribution, sym. Encryption) Special Advantages/Disadvantages  Advantage: many installed systems, lot of experience, available worldwide, free ISM-band, many vendors, integrated in laptops, simple system  Disadvantage: heavy interference on ISM-band, no service guarantees, slow relative speed only

IEEE b – PHY frame formats synchronizationSFDsignalserviceHECpayload PLCP preamblePLCP header variable bits length µs at 1 Mbit/s DBPSK1, 2, 5.5 or 11 Mbit/s short synch.SFDsignalserviceHECpayload PLCP preamble (1 Mbit/s, DBPSK) PLCP header (2 Mbit/s, DQPSK) variable bits length µs2, 5.5 or 11 Mbit/s Long PLCP PPDU format Short PLCP PPDU format (optional)

Channel selection (non-overlapping) 2400 [MHz] channel 1channel 7channel 13 Europe (ETSI) US (FCC)/Canada (IC) 2400 [MHz] channel 1channel 6channel MHz

WLAN: IEEE a Data rate  6, 9, 12, 18, 24, 36, 48, 54 Mbit/s, depending on SNR  User throughput (1500 byte packets): 5.3 (6), 18 (24), 24 (36), 32 (54)  6, 12, 24 Mbit/s mandatory Transmission range  100m outdoor, 10m indoor E.g., 54 Mbit/s up to 5 m, 48 up to 12 m, 36 up to 25 m, 24 up to 30m, 18 up to 40 m, 12 up to 60 m Frequency  Free , , GHz ISM-band Security  Limited, WEP insecure, SSID Cost  280€ adapter, 500€ base station Availability  Some products, some vendors Connection set-up time  Connectionless/always on Quality of Service  Typ. best effort, no guarantees (same as all products) Manageability  Limited (no automated key distribution, sym. Encryption) Special Advantages/Disadvantages  Advantage: fits into 802.x standards, free ISM-band, available, simple system, uses less crowded 5 GHz band  Disadvantage: stronger shading due to higher frequency, no QoS

IEEE a – PHY frame format rateservicepayload variablebits 6 Mbit/s PLCP preamblesignaldata symbols121variable reservedlengthtailparitytailpad variable 6, 9, 12, 18, 24, 36, 48, 54 Mbit/s PLCP header

Operating channels for a / US U-NII 5150 [MHz] MHz center frequency = *channel number [MHz] channel [MHz] MHz channel

OFDM in IEEE a (and HiperLAN2) OFDM with 52 used subcarriers (64 in total)  48 data + 4 pilot  (plus 12 virtual subcarriers)  kHz spacing subcarrier number channel center frequency kHz pilot

WLAN: IEEE – future developments (08/2002) d: Regulatory Domain Update – completed e: MAC Enhancements – QoS – ongoing  Enhance the current MAC to expand support for applications with Quality of Service requirements, and in the capabilities and efficiency of the protocol f: Inter-Access Point Protocol – ongoing  Establish an Inter-Access Point Protocol for data exchange via the distribution system g: Data Rates > 20 Mbit/s at 2.4 GHz; 54 Mbit/s, OFDM – ongoing h: Spectrum Managed a (DCS, TPC) – ongoing i: Enhanced Security Mechanisms – ongoing  Enhance the current MAC to provide improvements in security. Study Groups  5 GHz (harmonization ETSI/IEEE) – closed  Radio Resource Measurements – started  High Throughput – started