Original goal: Deploy wireless Ethernet First generation proprietary solutions (end 80, begin 90):
|
|
|
- Gyles Russell
- 10 years ago
- Views:
Transcription
1 Introduction to Wireless LANs Quote from Matthew Gast Wireless Networks The Definitive Guide apr. 2005, 2nd edition At this point, there is no way to prevent the spread of Wi-Fi. In the years since the first edition of [his] book, wireless networking has gone from an interesting toy to a must-have technology. [ ] [Wireless networking] seems poised to continue its march towards the standard method of network connection, replacing "Where's the network jack?" with "Do you have Wi-Fi?" as the question to ask about network access. WLAN history Original goal: Deploy wireless Ethernet First generation proprietary solutions (end 80, begin 90): WaveLAN (AT&T) HomeRF (Proxim) Abandoned by major chip makers (e.g. Intel: dismissed HomeRF in april 2001) IEEE Committee formed in 1990 Charter: specification of MAC and PHY for WLAN First standard: june and 2 Mbps operation Reference standard: september 1999 Multiple Physical Layers Two operative Industrial, Scientific & Medical (ISM) shared unlicensed band» 2.4 GHz: Legacy; b/g» 5 GHz: a 1999: Wireless Ethernet Compatibility Alliance (WECA) certification Later on named Wi-Fi Boosted deployment!! 1
2 WLAN data rates Legacy Work started in 1990; standardized in mbps & 2 mbps The 1999 revolution: PHY layer impressive achievements a: PHY for 5 GHz published in 1999 Products available since early b: higher rate PHY for 2.4 GHz Published in 1999 Products available since 1999 Interoperability tested (wifi) 2003: extend b g: OFDM for 2.4 GHz Published in june 2003 Products available, though no extensive interoperability testing yet Backward compatibility with b Wi-Fi 2009: n (oct 2009) MIMO, 2x bandwidth (40 MHz) Practical: up to mbps (but 600=150x4 possible) Standard Transfer Method legacy FHSS, DSSS, IR b DSSS, HR- DSSS "802.11b+" non-standard DSSS, HR- DSSS, (PBCC) Freq. Band 2.4 GHz, IR a OFDM 5.2, 5.5 GHz g DSSS, HR- DSSS, OFDM Data Rates Mbps 1, GHz 1, 2, 5.5, GHz 1, 2, 5.5, 11, 22, 33, 44 6, 9, 12, 18, 24, 36, 48, GHz 1, 2, 5.5, 11; 6, 9, 12, 18, 24, 36, 48, 54 Ongoing: ac/ad (1gbps, ???) Why multiple rates? Adaptive (?) coding/modulation Example: a case 2
3 PHY distance/rate tradeoffs (open office) Distance (m) GHz OFDM (.11a) 2.4 GHz OFDM (.11g) 2.4 GHz (.11b) Mbps 5.5Mbps 6Mbps 11Mbps 12Mbps 24Mbps 36Mbps 54Mbps Coverage performance Cisco Aironet 350 Access Point 11 Mb/s DSS from ~30 to ~45 mt Configurable TX power: 50, 30, 20, 5, 1 mw (100 mw outside Europe) 5.5 Mb/s DSS from ~45 to ~76 mt 2 Mb/s DSS from ~76 to ~107 mt Greater TX power, faster battery consumptions! Question: how to select transmission rate? (STA does not explicitly know its distance from AP) More later (implementation-dependent ) 3
4 WLAN NIC addresses Same as Ethernet NIC 48 bits = Ethernet & WLAN addresses do coexist undistinguishable, in a same (Layer-2) network role of typical AP = bridge» (to be precise: when the AP act as portal in nomenclature) 802 IEEE 48 bit addresses 1 bit = individual/group 1 bit = universal/local 46 bit address C:>arp -a a-e6-f8-03-ad dinamico e a dinamico dinamico AP AP :0a:e6:f8:03:ad :06:6e:00:32:1a :82:00:11:22:33 Protocol stack : just another 802 link layer LLC Logical Link DATA LINK LAYER LLC sublayer 802 overview & architecture MAC management & bridging MAC PHY FSSS PHY DSSS PHY MAC a OFDM PHY b HR-DSSS PHY g Extended Rate PHY DATA LINK LAYER MAC sublayer PHYSICAL LAYER 4
5 MAC Data Frame MAC header: - 28 bytes (24 header + 4 FCS) or - 34 bytes (30 header + 4 FCS) PHY IEEE Data FCS Frame Duration / ID Address 1 Address 2 Address 3 Sequence Address 4 Data Frame check sequence Protocol version Type Sub Type info Fragment Sequence number number 4 12 To From More Pwr More Sub Type Retry WEP Order DS DS Frag MNG Data DETAILS AND EXPLANATION LATER ON Encapsulation MAC frame: no type field (such as Ethernet II)!! LLC encapsulation mandatory Identical To 802.3/LLC encapsulation 5
6 Crossing a wireless bridge / 1 DEST SRC type P ETH/ bridge MAC header AAAA Type P DEST SRC type P /ETH bridge Crossing a wireless bridge / 2 DEST SRC Len AAAA Type P ETH/ bridge MAC header AAAA Type P DEST SRC type P /ETH bridge 6
7 Why Ethernet Tunnel? (just needed in very special cases: IPX, AARP) DESC SRC Len AAAA Type P ETH/ bridge DESC SRC Type P????? DESC SRC Len AAAA Type P /ETH bridge Some protocols MUST have this Encapsulation: -Novell IPX (Type 0x8137) - Apple-Talk ARP (Type 0x80F3) Handling frames Radio Hardware PC-Card Hardware WMAC controller with Station Firmware (WNIC-STA) Driver Software (STADr) STA frame format frame format Platform Computer Ethernet V2.0 / frame format Protocol Stack Ethernet-like driver interface supports virtually all protocol stacks Maximum Data limited to 1500 octets Frame translation IEEE Std 802.1H IEEE frames: translated to Ethernet Types 8137 (Novell IPX) and 80F3 (AARP) encapsulated via Ethernet Tunnel» In general, any protocol listed in the selective translation table of the bridge All other Ethernet Types: encapsulated via RFC 1042 SNAP Transparent bridging to Ethernet Radio Hardware PC-Card Hardware frame format WMAC controller with Access Point Firmware (WNIC-AP) frame format Driver Software (APDr) Bridge Software Ethernet V2.0 / frame format Kernel Software (APK) Ethernet Interface AP Bridge Hardware 7
8 Network Architecture And related addressing Basic Service Set (BSS) group of stations that can communicate with each other Infrastructure BSS or, simply, BSS Stations connected through AP Typically interconnetted to a (wired) network infrastructure AP Network infrastructure Independent BSS (IBSS) Stations communicate directly with each other Smallest possible IBSS: 2 STA IBSS set up for a specific purpose and for short time (e.g. meeting) That s why they are also called ad hoc networks 8
9 Frame Forwarding in a BSS Network infrastructure AP BSS: AP = relay function No direct communication allowed! IBSS: direct communication between all pairs of STAs Why AP = relay function? Management: Mobile stations do NOT neet to maintain neighbohr relationship with other MS in the area But only need to make sure they remain properly associated to the AP Association = get connected to (equivalent to plug-in a wire to a bridge ) Power Saving: APs may assist MS in their power saving functions by buffering frames dedicated to a (sleeping) MS when it is in PS mode Obvious disadvantage: use channel bandwidth twice 9
10 Addressing in IBSS (ad hoc) SA DA Frame Duration / ID Address 1 DA Address 2 SA Address 3 BSSID Sequence SA = Source Address DA = Destination Address BSSID = Basic Service Set IDentifier used for filtering frames at reception (does the frame belong to OUR cell?) format: 6 bytes random MAC address with Universal/Local bit set to 1 Data FCS Addressing in a BSS? AP SA X DA 10
11 Addressing in a BSS! AP Distribution system SA DA Frame must carry following info: 1) Destined to DA 2) But through the AP What is the most general addressing structure? Addressing in a BSS (to AP) Distribution system AP BSSID Address 2 = wireless Tx Address 1 = wireless Rx Address 3 = dest BSSID = AP MAC address SA DA Frame Duration / ID Address 1 BSSID Address 2 SA Address 3 DA Sequence Data FCS Protocol Type version 2 2 To From More Sub Type DS DS Frag Retry Pwr More WEP Order MNG Data
12 Addressing in a BSS (from AP) AP BSSID Distribution system Address 2 = wireless Tx Address 1 = wireless Rx Address 3 = src SA DA Frame Duration / ID Address 1 DA Address 2 BSSID Address 3 SA Sequence Data FCS Protocol Type version 2 2 To From More Sub Type DS DS Frag Retry Pwr More WEP Order MNG Data From AP: do we really need 3 addresses? Distribution system AP BSSID SA DA DA correctly receives frame, and send ACK to BSSID (wireless transmitted) DA correctly receives frame, and send higher level ACK to SA (actual transmitter) 12
13 Extended Service Set BSS1 AP1 BSS2 BSS3 BSS4 AP2 AP3 AP4 ESS: created by merging different BSS through a network infrastructure (possibly overlapping BSS to offer a continuous coverage area) Stations within ESS MAY communicate each other via Layer 2 procedures APs acting as bridges MUST be on a same LAN or switched LAN or VLAN (no routers in between) Service Set IDentifier (SSID) name of the WLAN network Plain text (ascii), up to 32 char Assigned by the network administrator All BSS in a same ESS have same SSID Typically (but not necessarily) is transmitted in periodic management frames (beacon) Disabling SSID transmission = a (poor!) security mechanism Typical: 1 broadcast beacon every 100 ms (configurable by sysadm) Beacon may transmit a LOT of other info (see example a simple one!) IEEE wireless LAN management frame Fixed parameters (12 bytes) Timestamp: 0x EAB69185 Beacon Interval: 0, [Seconds] Capability Information: 0x = ESS capabilities: Transmitter is an AP = IBSS status: Transmitter belongs to a BSS = CFP participation capabilities: Point coordinator at AP for delivery and polling (0x0001) = Privacy: AP/STA can support WEP = Short Preamble: Short preamble not allowed = PBCC: PBCC modulation not allowed = Channel Agility: Channel agility not in use = Short Slot Time: Short slot time not in use = DSSS-OFDM: DSSS-OFDM modulation not allowed Tagged parameters Tag Number: 0 (SSID parameter set) Tag length: 4 Tag interpretation: WLAN Tag Number: 1 (Supported Rates) Tag length: 4 Tag interpretation: Supported rates: 1,0(B) 2,0(B) 5,5 11,0 [Mbit/sec] Tag Number: 6 (IBSS Parameter set) Tag length: 1 Tag interpretation: ATIM window 0x2 Tag Number: 5 ((TIM) Traffic Indication Map) Tag length: 4 Tag interpretation: DTIM count 0, DTIM period 1, Bitmap control 0x0, (Bitmap suppressed) 13
14 The concept of Distribution System Logical architecture component Provides a service DSS = Distribution System Service Standard does NOT say how it is implemented Specified only which functions it provides Association Disassociation Reassociation Integration Distribution Association/disassociation Registration/de-registration of a STA to an AP Equivalent to plugging/unplugging the wire to a switch DS uses this information to determine which AP send frames to Reassociation i.e. handling STA mobility in a same ESS! Distribution An AP receives a frame on its air interface (e.g. STA 2) It gives the message to the distribution service (DSS) of the DS The DSS has the duty to deliver the frame to the proper destination (AP) Integration Must allow the connection to non LANs Though, in practice, non LANs are Ethernet and no real portals are deployed MSs in a same ESS need to 1) communicate each other 2) move through the ESS DS, again Distribution system (physical connectivity + logical service support) AP1 AP2 AP3 IAPP/proprietary IAPP/proprietary Association Typical implementation (media) Switched Ethernet Backbone But alternative Distribution Medium are possible E.g. Wireless Distribution System (WDS) Implementation duties an AP must inform other APs of associated MSs MAC addresses Standardization From 1997: tentative to standardize an IAPP Finalized as working practice standard in F (june 2003) Nobody cared! Plenty of proprietary solutions Must use APs from same vendor in whole ESS Current trends (2004+): Centralized solutions (see Aruba, Cisco, Colubris) Include centralized management, too! Current attempt: convergence to CAPWAP? 14
15 Addressing in an ESS Same approach! Works in general, even if DA in different BSS Distribution System AP AP BSSID#1 DA DA SA (unprecise! No portal here) idea: DS will be able to forward frame to dest (either if fixed or wireless MAC) Frame Duration / ID Address 1 BSSID#1 Address 2 SA Address 3 DA Sequence Data FCS Protocol Type version 2 2 To From More Sub Type DS DS Frag Retry Pwr More WEP Order MNG Data Addressing in an ESS Same approach! Works in general, even if DA in different BSS Distribution System AP AP BSSID#2 SA DA DA Frame Duration / ID Address 1 DA Address 2 BSSID#2 Address 3 SA Sequence Data FCS Protocol Type version 2 2 To From More Sub Type DS DS Frag Retry Pwr More WEP Order MNG Data
16 Wireless Distribution System AP1 AP2 AP3 DS medium: - not necessarily an ethernet backbone! - could be the technology itself Resulting AP = wireless bridge Addressing within a WDS Wireless Distribution System AP TA AP RA SA Address 4: initially forgotten? DA Frame Duration / ID Address 1 RA Address 2 TA Address 3 DA Sequence Address 4 SA Data FCS Protocol Type version 2 2 To From More Sub Type DS DS Frag Retry Pwr More WEP Order MNG Data
17 Addressing: summary Receiver Transmitter Function To DS From DS Address 1 Address 2 Address 3 Address 4 IBSS 0 0 RA = DA SA BSSID N/A From AP 0 1 RA = DA BSSID SA N/A To AP 1 0 RA = BSSID SA DA N/A Wireless DS 1 1 RA TA DA SA BSS Identifier (BSSID) unique identifier for a particular BSS. In an infrastructure BSSID it is the MAC address of the AP. In IBSS, it is random and locally administered by the starting station. (uniqueness) Transmitter Address (TA) MAC address of the station that transmit the frame to the wireless medium. Always an individual address. Receiver Address (RA) to which the frame is sent over wireless medium. Individual or Group. Source Address (SA) MAC address of the station who originated the frame. Always individual address. May not match TA because of the indirection performed by DS of an IEEE WLAN. SA field is considered by higher layers. Destination Address (DA) Final destination. Individual or Group. May not match RA because of the indirection MAC CSMA/CA Distributed Coordination Function Carrier Sense Multiple Access With Collision Avoidance 17
18 Wireless Medium Unreliability 11 Mbps b outdoor measurements - Roma 2 Campus - roof nodes Must rely on explicit ACKs Successful DATA transmission: ONLY IF an ACK is received SENDER RECEIVER ACK transmission provided by MAC layer Immediate retransmission» Don t get confused with higher layer rtx DATA ACK DATA-ACK exchange: Also called two-way handshake Or Basic Access Mechanism 18
19 Possible errors Three causes of insuccess PHY Error Receiver cannot synchronize with transmitted frame» preamble + SFD needed or cannot properly read Physical Layer Protocol (PLCP) header» PLCP header contains the essential information on employed rate» Without it receiver cannot know how to demodulate/decode received frame! CRC32 error MAC frame (MAC Header + Payload) CRC failures» The greater the rate, the higher the SNR required to correctly transmit ACK Error Transmitter does not receive ACK» ACK corrupted by PHY or CRC32 errors It IS an error: though data frame was correctly received, transmitted does not know» Introduce issue of duplicated frames at the receiver PHY MAC header Payload FCS Preamble SFD PLCP hdr Wireless errors 11 Mbps b/g OUTDOOR measurements - Roma 2 Campus - roof nodes b@11Mbps g@6Mbps PHY errors CANNOT be reduced through automatic rate fallback mechanisms An (apparent) paradox: b@11mbps outdoor outperforms g@6mbps!!! but it is NOT a paradox since most g errors are PHY (unrelated with rate) 19
20 Must forget Collision Detection! One single RF circuitry Either TX or RX Half-duplex Even if two simultaneous TX+RX: large difference (100+ db!) in TX/RX signal power Impossible to receive while transmitting On a same channel, of course Collision detection at sender: meaningless in wireless! Ethernet = collision detection at sender Wireless = large difference in the interference power between sender & receiver! Collision OCCURS AT THE RECEIVER STA tx rx A detects a very low interference (C is far) no collision A B C B detects a disructive interference (C is near) collision occurs Distributed Coordination Function Basics 20
21 MAC Intended for Contention-Free Services Used for all other services, and used as basis for PCF POINT COORDINATION FUNCTION PCF (polling) DISTRIBUTED COORDINATION FUNCTION DCF (CSMA/CA) PCF: baiscally never user / supported!! MAC evolution (802.11e, finalized in december 2005) Dead Intended for Contention-Free Services Used for service differentiation (priorities) Legacy PCF (polling) HYBRID COORDINATION FUNCTION HCF led Channel Access HCCA (scheduling) HCF Enhanced Distributed ChannelAccess EDCA (prioritized CSMA) DCF All enhancements rely on DCF basic operation! 21
22 Carrier Sense Multiple Access Station may transmit ONLY IF senses channel IDLE for a time = Distributed Inter Frame Space Key idea: ACK replied after a SIFS < SIFS = Short Inter Frame Space Other stations will NOT be able to access the channel during the handshake Provides an atomic DATA-ACK transaction Packet arrival TX DATA RX SIFS ACK OTHER STA Packet arrival Must measure a whole OK! Frame Duration / ID DATA/ACK frame format DATA frame: 28 (or 34) bytes + payload Address 1 Address 2 Address 3 Sequence Address 4 Data Frame check sequence Protocol Type version x x x x x x x x To From More Sub Type DS DS Frag Retry Pwr More WEP Order MNG Data Type = Data (10) SubType = Data (0000) ACK frame: 14 bytes No need for TA address (the station receiving the ACK knows who s this from)!! Frame Duration / ID Address (RA) Frame check sequence x Protocol Type version 2 2 To From More Sub Type DS DS Frag Retry Pwr More WEP Order MNG Data Type = (01) SubType = ACK (1101) 22
23 Grasping wi-fi (802.11b) numbers = 50 µs Rationale: 1 SIFS + 2 slot-times Slot time = 20 µs, more later SIFS = 10 µs Rationale: RX_TX turnaround time The shortest possible! DATA (28+payload) [bytes] x 8 / TX_rate [mbps] = µs PHY MAC header 24 (30) Payload FCS ACK Preamble SFD PLCP hdr 1 mbps DBPSK 192 µs PHY ACK µs 112 µs DATA frame: TX time = f(rate) Impressive PHY overhead! 192 µs per every single frame Total data frame time (1500 Mbps: = µs» PHY+MAC overhead = Mbps: = µs» PHY+MAC overhead = 16.% Overhead increases for small frames! ACK frame: TX at basic rate Typically 1 mbps but 2 mbps possible ACK frame duration (1mbps): 304 µs And when an ACK is hidden? 1) Sender TX Receiver RX STA defers STA SENDER RECEIVER 2) Receiver ACKs (after SIFS) STA cannot hear STA SENDER RECEIVER 3) STA tranmits And destroys ACK! STA SENDER RECEIVER STA BUSY DETECT (DATA) SIFS STA TX! ACK 23
24 The Duration Field Frame Duration / ID Address 1 Address 2 Address 3 Sequence Address 4 Data Frame check sequence # microseconds When bit 15 = 1 NOT used as duration (used by power-saving frames to specify station ID) Allows Virtual Carrier Sensing Other than physically sensing the channel, each station keeps a Network Allocation Vector (NAV) Continuously updates the NAV according to information read in the duration field of other frames DATA SIFS ACK OTHER STA Physical carrier sensing Virtual carrier sensing NAV (data) And when a terminal is hidden? STA RECEIVER SENDER this can be solved by increasing the sensitiveness of the Carrier Sense Quite stupid, though (LOTS of side effects out of the goals of this lecture) this can s be solved by any means! STA RECEIVER SENDER The Hidden Terminal Problem SENDER and STA cannot hear each other SENDER transmits to RECEIVER STA wants to send a frame Not necessarily to RECEIVER STA senses the channel IDLE Carrier Sense failure Collision occurs at RECEIVER Destroys a possibly very long TX!! 24
25 Packet arrival The RTS/CTS solution TX RTS DATA RX SIFS CTS SIFS SIFS ACK others NAV (RTS) NAV (CTS) RX TX RTS CTS CTS hidden (Update NAV) RTS/CTS: carry the amount of time the channel will be BUSY. Other stations may update a Network Allocation Vector, and defer TX even if they sense the channel idle (Virtual Carrier Sensing) RTS/CTS frames RTS frame: 20 bytes Frame Duration / ID Address 1 (RA) Frame check sequence Protocol Type version 2 2 Address 2 (TA) x To From More Sub Type DS DS Frag Retry Pwr More WEP Order MNG Data Type = (01) SubType = RTS (1011) CTS frame: 14 bytes (same as ACK) Frame Duration / ID Address (RA) Frame check sequence x Protocol Type version 2 2 To From More Sub Type DS DS Frag Retry Pwr More WEP Order MNG Data Type = (01) SubType = CTS (1100) 25
26 RTS/CTS and performance RTS/CTS cons: larger overhead RTS/CTS pros: reduced collision duration ESPECIALLY FOR LONG PACKETS Long packet > RTS_Threshold (configurable) TODAY higher rates No more significant Issues with duration reading Duration field in MAC header Coded at same rate as payload Must receive whole MAC frame correctly 11 mbps range 5.5 mbps range 2 mbps range 1 mbps range RX TX 11 Mbps tx C cannot read TX frame No way to know duration value C 26
27 ACK may be hidden once again! C hidden from RX Carrier sense remains IDLE during RX TX ACK NAV could not be updated May transmit after a Destroying ACK! ACK transm TX C RX EIFS = protect ACK C cannot read data frame CRC32 error Most of PHY errors 11 mbps range 5.5 mbps range 2 mbps range 1 mbps range RX TX 11 Mbps tx If planning to transmit: No more after a But after a LONGER interval of time Sufficiently long to protect ACK transmission C 27
28 EIFS Source station Destination station Data ACK Back-off Other stations receiving Data frame correctly SIFS NAV Back-off Back-off Other stations receiving Data frame incorectly EIFS Why backoff? STA1 DATA SIFS ACK STA2 STA3 Collision! RULE: when the channel is initially sensed BUSY, station defers transmission; THEN,when channel sensed IDLE again for a, defer transmission of a further random time (Collision Avoidance) 28
29 STA2 STA3 Slotted Backoff w=7 Extract random number in range (0, W-1) Decrement every slot-time σ w=5 Note: slot times are not physically delimited on the channel! Rather, they are logically identified by every STA Slot-time values: 20µs for DSSS (wi-fi) Accounts for: 1) RX_TX turnaround time 2) busy detect time 3) propagation delay Backoff freezing When STA is in backoff stage: It freezes the backoff counter as long as the channel is sensed BUSY It restarts decrementing the backoff as the channel is sensed IDLE for a period STATION 1 DATA SIFS ACK STATION 2 SIFS ACK 6 5 BUSY medium Frozen slot-time
30 Why backoff between consecutive tx? A listening station would never find a slot-time after the (necessary to decrement the backoff counter) Thus, it would remain stuck to the current backoff counter value forever!! S 1 DATA SIFS ACK DATA SIFS ACK S BUSY medium Frozen slot-time 4 BUSY medium 3 Backoff rules First backoff value: Extract a uniform random number in range (0,CW min ) If unsuccessful TX: Extract a uniform random number in range (0,2 (CW min +1)-1) If unsuccessful TX: Extract a uniform random number in range (0,2 2 (CW min +1)-1) Etc up to 2 m (CW min +1)-1 Exponential Backoff! For b: CWmin = 31 CWmax = 1023 (m=5) 30
31 Further backoff rules Truncated exponential backoff After a number of attempts, transmission fails and frame is dropped Backoff process for new frame restarts from CWmin Protects against cannel capture unlikely when stations are in visibility, but may occur in the case of hidden stations Two retry limits suggested: Short retry limit (4), apply to frames below a given threshold Long retry limit (7), apply to frames above given threshold (loose) rationale: short frames are most likely generated bu realk time stations Of course not true in general; e.g. what about 40 bytes TCP ACKs? DCF Overhead 31
32 802.11b parameters (summary) Parameters PIFS used by Point Coordination Function - Time-bounded services - Polling scheme PCF Never deployed SIFS (µsec) (µsec) Slot Time (µsec) CWmin CWmax b PHY S = station DCF overhead Frame _ Tx E[ payload] E[ T ] + + CW / 2 min T = T + SIFS + T Frame _ Tx MPDU ACK T = T + SIFS + T + SIFS + T + SIFS + T Frame _ Tx RTS CTS MPDU ACK T T T T MPDU ACK RTS CTS = T = T = T = T PLCP PLCP PLCP PLCP + 8 (28 + L) / R / R / R / R ACK _ Tx RTS _ Tx CTS _ Tx MPDU _ Tx 32
33 Example: maximum achievable throughput for b DATA SIFS ACK backoff DATA Cycle time Data Rate = 11 mbps; ACK rate = 1 mbps Payload = 1500 bytes T T MPDU ACK = ( )/ = /1= 304 SIFS = 10; = E[ Backoff ] = 20 = Thr = = 6.07Mbps Data Rate = 11 mbps; ACK rate = 1 mbps Payload = 576 bytes T T MPDU ACK = ( )/ = /1= 304 SIFS = 10; = E[ Backoff ] = 20 = Thr = = 3.53Mbps REPEAT RESULTS FOR RTS/CTS Not viable (way too much overhead) at high rates! DCF overhead (802.11b) RTS/CTS Basic RTS/CTS Basic Tra nsmssion Time (use c ) Ave Backoff RTS+SIFS CTS+SIFS Payload+SIFS ACK 33
34 DCF overhead (802.11b) Normalized T hroughput 1 0,9 0,8 0,7 0,6 0,5 0,4 0,3 0, ,1 0 Payload Size (B ytes) BAS-2M bps RTS-2M bps BAS-11M bps RTS-11M bps MAC extras Selected topics, and for BSS case only (no IBSS) 34
35 Radio impairment Why Fragmentation High Bit Error Rate (BER) increases with distance The longer the frame, the lower the successful TX probability High BER = high rtx overhead & increased rtx delay backoff window increase: cannot distinguish collision from tx error!! frame frame frag0 frag1 frag2 frag3 frag4 frag5 Radio impairment Once again : Fragmentation not Viable with modern rates not used frag0 frag1 frag1 frag2 frag3 frag4 frag5 A C K A C K A C K A C K A C K A C K splits message (MSDU) into several frames (MPDU) Same fragment size except last one Fragmentation burst Fragments separated by SIFS channel cannot be captured by someone else Each fragment individually ACKed Fragmentation Each fragment reserves channel for next one NAV updated fragment by fragment Missing ACK for fragment x release channel (automatic) ACK_Timeout much longer that SIFS! Backoff Restart from transmission of fragment x sender receiver Other stations RTS SIFS SIFS SIFS SIFS CTS frag0 frag1 ACK ACK NAV (RTS) NAV (CTS) NAV(frag0) NAV(ACK) t SIFS 35
36 Fragment and sequence numbers DATA frame: 28 (or 34) bytes + payload Frame Duration / ID Address 1 Address 2 Address 3 Sequence Address Data Frame check sequence prot typ subtype to fr ds ds More Frag Retry 1 1 P + S da Wor Fragment Sequence Number number 4 12 Fragment number Increasing integer value 0 15 (max 16 fragments since 4 bits available) Essential for reassembly More Fragment bit (frame control field) set to: 1 for intermediate fragments 0 for last fragment Sequence Number Used to filter out duplicates Unlike Ethernet, hede duplicates are quite frequent! retransmissions are a main feature of the MAC Retry bit: helps to distingush retransmission Set to 0 at transmission of new frame Set to 1 at retransmissions beacons: Periodically transmitted Include timestamp To enable STA synchronization [.etc etc ] Power management Every beacon includes a Traffic Indication Map (TIM) Information element listing the stations for which UNICAST frames are buffered Bitmap!! (2008 bits = 251 bytes transmission split over multiple beacons) A station may then issue a PS-Poll control frame to enable transmission Instead of duration, PS-Poll contains AID (Association IDentifier of the STA: ) What about broadcast & multicast frames transmitted only after beacons containing a DTIM (Delivery TIM) 1 DTIM every X beacon (X configurable) 36
37 Power management - example STA A STA B STA B has set ReceiveDTIM to false to minimize power consumption! losing broadcast & multicast frames Point Coordination Function Token-based access mechanism Polling Channel arbitration enforced by a point Coordinator (PC) Typically the AP, but not necessarily Contention-free access No collision on channel DCF PCF PCF deployment: minimal!! Optional part of the specification As such, almost never deployed HCCA (802.11e) may be considered as PCF extension PHY PCF deployed on TOP of DCF Backward compatibility 37
38 PCF frame transfer SIFS Polling strategy: very elementary!! - send polling command to stations with increasing Association ID value - (regardless whether they might have or not data to transmit) Multi-rate operation Rate selection: proprietary mechanism! Result: different chipsets operate widely different Two basic approaches Adjust rate according to measured link quality (SNR estimate) How link quality is computed is again proprietary! Adjust rate according to frame loss How many retries? Step used for rate reduction? Proprietary! Problem: large amount of collisions (interpreted as frame loss) forces rate adaptation 38
39 Performance Anomaly Question 1: Assume that throughput measured for a single 11 mbps greedy station is approx 6 mbps. What is per-sta throughput when two 11 mbps greedy stations compete? Answer 1: Approx 3 mbps (easy ) Question 2: Assume that throughput measured for a single 2 mbps greedy station is approx 1.7 mbps. What is per-sta throughput when two 2 mbps greedy stations compete? Answer 2: Approx 0.85 mbps (easy ) Question 3: What is per-sta throughput when one 11 mbps greedy station compete with one 2 mbps greedy station? Answer 3:... Understanding Answers 1&2 (neclect collision indeed rare just slightly reduce computed value) backoff Frozen backoff STA 1 SIFS ACK STA 2 SIFS ACK Cycle time E[ payload] Thr[1] = Thr[2] = = E[ cycle time] T [1] + SIFS + ACK + + T [2] + SIFS + ACK + MPDU MPDU + E[ backoff ] Data Rate = 11 mbps; ACK rate = 1 mbps Payload = 1500 bytes T T MPDU ACK = ( )/ = /1= 304 SIFS = 10; = E[ Backoff ] = 20 = Thr = = 3.3Mbps 2 ( ) T T Data Rate = 2 mbps; ACK rate = 1 mbps Payload = 1500 bytes MPDU ACK = ( )/ = /1= 304 SIFS = 10; = E[ Backoff ] = 20 = Thr = = 0.88Mbps 2 ( )
40 Emerging problem : long-term fairness! If you have understood the previous example, you easily realize that provides FAIR access to stations in terms of EQUAL NUMBER of transmission opportunities in the long term! STA1 STA2 STA2 STA1 STA2 STA1 But this is INDEPENDENT OF transmission speed! Computing answer 3 Frozen backoff STA (2mbps) SIFS ACK STA 11 SIFS ACK Cycle time RESULT: SAME THROUGHPUT (in the long term)!! E[ payload] Thr[1] = Thr[2] = = E[ cycle time] = T MPDU = [1] + SIFS + ACK + + T [2] + SIFS + ACK + + E[ backoff ] = = 1.39 Mbps!!!!!! ( ) MPDU DRAMATIC CONSEQUENCE: throughput is limited by STA with slowest rate (lower that the maximum throughput achievable by the slow station)!! 40
41 Performance anomaly into action Why the network is soooo slow today? We re so Close, we have a 54 mbps and excellent channel, and we get Less than 1 mbps Hahahahahah!! Poor channel, 1mbps EDCA operation See details in: G. Bianchi, I Tinnirello, and L. Scalia IEEE NETWORK Magazine July/Aug
42 Multiple queues AP AC AC Video Voice Virtual collision Handler AC Best- AC Backefforground Wireless Channel 4 Access Categories Mapping the 8 priority levels provided by 802.1p Different parameters Independently operated Collide (virtually) each other! Differentiation methods in IEEE e EDCA Varying time to wait before channel access Different size of AIFS (arbitrary inter frame space) Varying the size of contention windows Different size of CWmin and CWmax Varying the amount of channel accessible time Different duration of TXOP 42
43 TXOP differentiation Effective since it changes the holding time of the channel for each station Does not affect collisions CWmin differentiation Operates by changing the longterm fairness ratio The sharing of resources is inversly proposional to the employed CWmin value A station with CWmin/4 will have 4 transmission opportunities versus 1, in average Problem: small CWs increase collision level! Large N = large amount of collisions = = less effective differentiation = penalty in overall thr 43
44 AIFS differentiation Light traffic Protected slots for green Heavy traffic Protected slots for green % of protected slots INCREASES 44
Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello
PART 6 IEEE 802.11 Wireless LANs Lecture 6.1 Introduction WLAN History Ł Original goal: Deploy wireless Ethernet First generation proprietary solutions (end 80, begin 90) WaveLAN (AT&T)) HomeRF (Proxim)
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
IEEE 802.11 frame format
IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and
A Technical Tutorial on the IEEE 802.11 Protocol
A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2
Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK
IEEE802.11 Wireless LAN
IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
Philippe Klein. avb-phkl-802-11-qos-overview-0811-1
802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course
IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/
WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
IEEE 802.11e WLANs / WMM. S.Rajesh ([email protected]) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.
IEEE 802.11e WLANs / WMM S.Rajesh ([email protected]) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. Outline A short review of 802.11 MAC Drawbacks of 802.11 MAC Application
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
Video Transmission over Wireless LAN. Hang Liu [email protected]
Video Transmission over Wireless LAN Hang Liu [email protected] Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!
802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011
IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
ECE 428 Computer Networks and Security
ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software
802.11 Arbitration. White Paper. September 2009 Version 1.00. Author: Marcus Burton, CWNE #78 CWNP, Inc. [email protected]
802.11 Arbitration White Paper September 2009 Version 1.00 Author: Marcus Burton, CWNE #78 CWNP, Inc. [email protected] Technical Reviewer: GT Hill, CWNE #21 [email protected] Copyright 2009 CWNP, Inc.
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
TCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e
An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e Jahanzeb Farooq, Bilal Rauf Department of Computing Science Umeå University Sweden Jahanzeb Farooq, 2006 ([email protected]) Chapter
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
EETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude [email protected] Discovery and Beaconing Discovery?
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO
An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement Eric Cheng-Chung LO A dissertation submitted to Auckland University of Technology in partial fulfillment
Wireless LAN Services for Hot-Spot
Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute [email protected] ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol
II. IEEE802.11e EDCA OVERVIEW
The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'7) CACITY IMPROVEMENT OF WIRELESS LAN VOIP USING DISTRIBUTED TRANSMISSION SCHEDULING Kei Igarashi,
Department of Computer Science Columbia University
Towards the Quality of Service for VoIP traffic in IEEE 82.11 Wireless Networks Sangho Shin Henning Schulzrinne Email: sangho, [email protected] Department of Computer Science Columbia University 28
WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
IEEE 802.11 Wireless Local Area Networks
ABSTRACT The draft IEEE 82. Wireless Local Area Network (WLAN) specification is approaching completion. In this article, the IEEE 82. protocol is explained, with particular emphasis on the medium access
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
Measuring the service level in the 2.4 GHz ISM band
Measuring the service level in the 2.4 GHz ISM band Internal report Jan-Willem van Bloem and Roel Schiphorst University of Twente Department of Electrical Engineering, Mathematics & Computer Science (EEMCS)
Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)
Vol.2, Issue.2, Mar-Apr 2012 pp-078-083 ISSN: 2249-6645 Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) 1 Y V Adi Satyanarayana, 2 Dr. K Padma Raju 1 Y V Adi Satyanarayana, Assoc. Professor,
How To Configure the WLAN with QoS
How To Configure the WLAN with QoS Introduction This How to Note explains how to configure Quality of Service (QoS) in a wireless Local Area Network to prioritize traffic under busy conditions. There is
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
IEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: [email protected] E. Borgia, M. Conti, E.
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)
FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
CSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
Virtual PCF: Improving VoIP over WLAN performance with legacy clients
Virtual PCF: Improving VoIP over WLAN performance with legacy clients by Usman Ismail A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
Wireless Local Area Networks and the 802.11 Standard
Wireless Local Area Networks and the 802.11 Standard March 31, 2001 Plamen Nedeltchev, PhD Edited by Felicia Brych Table of Contents1 Introduction... 3 Upper Layer Protocols of OSI... 3 WLAN Architecture...
A TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
COMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF
Gigabit Ethernet MAC (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF 1. INTRODUCTION This document serves as a product info for the Gigabit Ethernet MAC from Hitek Systems. The core supports
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
Introduction to Ad hoc Networks
Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg [email protected] Avaya Labs Research Basking Ridge, NJ USA Martin Kappes [email protected] Avaya Labs Research
Overview of 802.11 Networks and Standards
Overview of 802.11 Networks and Standards Mauri Kangas, Helsinki University of Technology, 17.02.2004 Mauri Kangas 17.2.2004 Page 1 (34) Family of 802.xx Standards ISO/IEC 8802-xx = IEEE 802.xx IEEE 802.1
Medium Access Control (MAC) and Wireless LANs
Medium Access Control (MAC) and Wireless LANs Outline Wireless LAN Technology Medium Access Control for Wireless IEEE 802.11 Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic
Lecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012
TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log
WI-FI TECHNOLOGY: SECURITY ISSUES
RIVIER ACADEMIC JOURNAL, VOLUME 2, NUMBER 2, FALL 2006 WI-FI TECHNOLOGY: SECURITY ISSUES Vandana Wekhande* Graduate student, M.S. in Computer Science Program, Rivier College Keywords: Wireless Internet,802.11b,
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Research In Motion D. Stanley, Ed. Aruba Networks March 2009
Network Working Group Request for Comments: 5416 Category: Standards Track P. Calhoun, Ed. Cisco Systems, Inc. M. Montemurro, Ed. Research In Motion D. Stanley, Ed. Aruba Networks March 2009 Control and
Wireless Network Measurement: VoIP and 802.11e
Wireless Network Measurement: VoIP and 82.11e by Ian Dangerfield, B.A Masters Thesis Hamilton Institute National University of Ireland Maynooth Maynooth Co. Kildare December 27 Research Supervisor: Dr.
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
Introduction to IEEE 802.11 Wireless LAN
Introduction to IEEE 802.11 Wireless LAN Li-Hsing Yen Chung Hua University Fall 2006 Difference Between Wired and Wireless LANs The medium impacts the design stations are mobile different MAC 1 Medium
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
Configuring QoS in a Wireless Environment
Configuring QoS in a Wireless Environment This chapter describes how to configure quality of service (QoS) on your Cisco wireless interface. With this feature, you can provide preferential treatment to
ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
GTER 26 tudo o que você. quer saber sobre 802.11n
GTER 26 tudo o que você (não) quer saber sobre 802.11n Luiz Eduardo Dos Santos CISSP CWNE CEH GISP GCIH Sr. Systems & Security Engineer Americas hello agenda evolution of wi-fi what makes 11n what actually
Modeling and Simulation of Quality of Service in VoIP Wireless LAN
Journal of Computing and Information Technology - CIT 16, 2008, 2, 131 142 doi:10.2498/cit.1001022 131 Modeling and Simulation of Quality of Service in VoIP Wireless LAN A. Al-Naamany, H. Bourdoucen and
WildPackets Guide to Wireless LAN Analysis
WildPackets Guide to Wireless LAN Analysis Executive Summary The market for wireless communications has grown rapidly since the introduction of 802.11 wireless local area networking (WLAN) standards. Business
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Ethernet, VLAN, Ethernet Carrier Grade
Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 [email protected] www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP
MAC Algorithms in Wireless Networks
Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated
Next Generation 802.11 Wireless Local Area Networks
Next Generation 802.11 Wireless Local Area Networks This is a 2 day course technical course intended to give student a solid understanding of the emerging IEEE 802.11 standards, how it works including
Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos [email protected] 2-2009
Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos [email protected] 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice
Wi-Fi Capacity Analysis for 802.11ac and 802.11n: Theory & Practice By Timo Vanhatupa, Ph.D. Senior Research Scientist at Ekahau Contents Introduction Why capacity matters with Wi-Fi... 3 Part 1: Modeling
Can I add a VoIP call?
Can I add a VoIP call? Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Abstract In this paper, we study the
Ph.D. Thesis. Resources optimization in multimedia communications. Luca Sanna Randaccio. Advisor: Prof. Luigi Atzori
Ph.D. Thesis Resources optimization in multimedia communications Luca Sanna Randaccio Advisor: Prof. Luigi Atzori University of Cagliari Department of Electrical and Electronic Engineering Table of Contents
Fast Retransmission Mechanism for VoIP in IEEE 802.11e wireless LANs
Fast Mechanism for VoIP in IEEE 802.11e wireless LANs Gyung-Ho Hwang and Dong-Ho Cho Division of Electrical Engineering, Department of Electrical Engineering and Computer Science, KAIST, 373-1 Guseong-dong
Voice over WLAN (VoWLAN) A wireless voice alternative?
Voice over WLAN (VoWLAN) A wireless voice alternative? Trond Ulseth Paal Engelstad Abstract Voice over WLAN (VoWLAN) is a natural evolution of VoIP. It is also a potential supplement or a potential competitor
