Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:



Similar documents
Chapter 7 Low-Speed Wireless Local Area Networks

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Wireless Personal Area Networks (WPANs)

CSMA/CA. Information Networks p. 1

EPL 657 Wireless Networks

Wireless LAN Concepts

Lecture 17: Wireless Networking"

Tecnologías Inalámbricas.

Overview of Networks and Standards

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Introduction to Ad hoc Networks

Basic processes in IEEE networks

IEEE Wireless LAN Standard. Updated: 5/10/2011

WPAN. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Wireless LANs vs. Wireless WANs

ECE/CS 372 introduction to computer networks. Lecture 13

CHAPTER 1 1 INTRODUCTION

IEEE Technical Tutorial. Introduction. IEEE Architecture

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

communication over wireless link handling mobile user who changes point of attachment to network

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo

11/22/

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

Introduction Chapter 1. Uses of Computer Networks

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

WIRELESS ETHERNET (IEEE )

Introduction to Ethernet

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

Wiereless LAN

IEEE Simulation and BER Analysis under the Interference

Wireless Local Area Network

IEEE Wireless LAN

Wireless Local Area Networks and the Standard

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Mobile Services (ST 2010)

A Technical Tutorial on the IEEE Protocol

... neither PCF nor CA used in practice

Hello viewers, welcome to today s lecture on cellular telephone systems.

Wi-Fi and Bluetooth - Interference Issues

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

Security Requirements for Wireless Networks and their Satisfaction in IEEE b and Bluetooth

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

Bluetooth voice and data performance in DS WLAN environment

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

IT4405 Computer Networks (Compulsory)

WI-FI TECHNOLOGY: SECURITY ISSUES

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Electromagnetic Spectrum (3kHz 300GHz)

Local Area Networks (LANs) Blueprint (May 2012 Release)

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System

Wireless LAN Services for Hot-Spot

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs

Performance Evaluation of Wired and Wireless Local Area Networks

Telecom Regulatory Authority Technical Affairs & Technology Sector WiFi Technology

Wireless Local Area Networking For Device Monitoring

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

RoamAbout Wireless Networking Guide

Wireless Technologies for Automation

CS263: Wireless Communications and Sensor Networks

Wireless Network Policy

Spring Final Project Report

Adaptive DCF of MAC for VoIP services using IEEE networks

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

CWNA Instructor Led Course Outline

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Mac Protocols for Wireless Sensor Networks

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Mobile Computing/ Mobile Networks

Connection Services. Hakim S. ADICHE, MSc

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

EKT 331/4 COMMUNICATION NETWORK

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

10. Wireless Networks

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 2.0

High-Level Data Link Control

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Customer Specific Wireless Network Solutions Based on Standard IEEE

WUA Mbps Wireless USB Network Adapter

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Medium Access Control (MAC) and Wireless LANs

LTE, WLAN, BLUETOOTHB

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

CHAPTER. Wireless Networking

Mobile Communication Systems: DECT Digital Enhanced Cordless Telecommunication

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Lecture 7 Multiple Access Protocols and Wireless

Transcription:

WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce high flexibility for ad hoc communicaton (e.g. Group meetings) Wireless LAN advantages Flexibility: within radio coverage, nodes can communicate without further restriction. Radio waves can penetrate walls. Planning: wireless ad hoc networks allow for communication without planning. Wired networks need wiring plans. Robustness: wireless networks can survive disasters, if the wireless devices survive people can still communicate Wireless LAN disadvantages Wireless LAN disadvantages QoS: WLANs offer tipically lower QoS. Lower bandwidth due to limitations in radio transmission (1-10 Mbit/s) and higher error rates due to interference Cost: ethernet adapter vs wireless LAN adapters Proprietary solutions: slow standardization procedures lead to many proprietary solutions only working in an homogeneous environment Safety and security: using radio waves for data transmission might interfere with other high-tech equipment

Wireless LAN: main design goals Global operation: LAN equipment may be carried from one country to another and this operation should be legal (frequency regulations national and international). Low power: take into account that devices communicating via WLAN are tipically running on battery power. Special power saving modes and power management functions. Wireless LAN: main design goals Simplified spontaneous co-operation: no complicated setup routines but operate spontaneously after power. Easy to use: WLANs are made for simple users, they should not require complex management but rather work on a plug-and-play basis. Wireless LAN: main design goals Protection of investment: a lot of money has been invested for wired LANs, WLANs should be able to interoperate with existing network (same data type and services). Safety and security: safe to operate. Encryption mechanism, do not allow roaming profiles for tracking people (privacy) Basic transmission technologies for WLANs Infrared and radio Transparency for applications: existing applications should continue to work.

Infrared vs. radio transmission Infrared: based on transmission of infrared light Radio transmission: uses the radio transmission in the ISM free-license GHz range Infrared uses diffuse light reflected at walls or directed light if a line-of-sight (LOF) exists between sender and receiver Infrared Infrared Technology (IR) frequencies just below the visible light cannot penetrate opaque objects, and low diffusion line-of-sight limitates mobility short range technology (indoor, PAN, LAN nets) High data-rate potential Luciano Bononi 2002 Infrared vs. radio transmission The main advantages of infrared: Infrared vs. radio transmission The main disadvantages of infrared: sender and receiver are very cheap (integrated in almost all mobile devices available today) No license is needed for infrared technology Electrical devices do not interfere with infrared transmission Shielding is very simple Low bandwidth compared with other LAN technologies Limited transfer rate Infrared transmission can not penetrate walls or other obstacles For good transmission LOS is needed

Infrared vs. radio transmission The main advantages of radio transmission: Infrared vs. radio transmission The main disadvantages of radio transmission: Long-term experience for wide area networks and mobile cellular phones Can cover larger area and can penetrate walls, furniture.. Does not need LOS Current radio-based products offer higher transmission rates (10 Mbit/s) Shielding is not simple(this is also the main advantage), radio transmission can interfere with other senders or electrical devices can destroy data transmitted It is only permitted in certain frequency bands Very limited ranges of license-free bands are available but they are not the same in all countries Radio transmission interference Wireless network structures Infrastructure and ad hoc networks Luciano Bononi 2002

WLAN: Wireless network structures Ad-Hoc: peer-to-peer (P2P) on the fly communication the network is the set of computers no administration, no setup, no cost? Infrastructure: Centralized control unit (Access Point, local server) Roaming between cells resource sharing and backbone connection Luciano Bononi 2002 Infrastructure-based wireless network Communication typically takes place only between the wireless nodes and the access point. Not directly between the wireless nodes. Access point: acts as a bridge Access points with a fixed network can connect several wireless networks to form a larger network beyond the actual radio coverage Infrastructure-based wireless network Design is simpler because most of the network functionality lays within the access point Collision may occur if medium access of the wireless node and the access point is not coordinated Useful for Qos garantees such as minimum bandwidth for certain nodes Infrastructure-based wireless network Lose some of the flexibility wireless networks can offer, they cannot be used for disaster relief Cellular phone are typically infrastructure-based networks for wide area Also satellite-based cellular phone have an infrastructure (the satellites)

Ad hoc wireless networks Radio transmission coverage ~4 Ptx Do not need any infrastructure to work Each node can directly communicate with another node Nodes can only communicate if they reach each other physically (if they are within each other s radio range) or if other nodes can forward the message. A d signal detection limit A Ptx The range is a function of power transmission (Ptx) Signal strength reduces with d^2 (no obstacles) d 2d Luciano Bononi 2002 Ad hoc wireless networks The complexity of each node is higher: medium access mechanisms, priority mechanisms to provide a certain QoS Exhibits the greatest possible flexibility (unexpected meetings, communication scenario far away from any infrastructure) Infrastructure and ad hoc networks The two variant can be combined Networks that rely on access points and infrastructure for basic services (authentication of access), also allowing direct communication between the wireless nodes Ad hoc networks might only have selected nodes with the capabilities of forwarding data. Most of the node have to connect first to a special node in order to transmit data to the receiver if it is out of their range

Basic transmission technology for WLANs Defines the characteristics of the physical layer (PHY) and medium access control layer (MAC) for wireless LAN Provide the same interface to higher layers as the others in order to maintain interoperability The 2.4 GHz ISM band was chosen for the standard, which is available in most countries around the world The original standard sets the access rate of 1 and 2 Mbps. The extension 802.11b define the access rate of 5,5 and 11 Mbps Network configuration Network configurations: Ad-Hoc (peer to peer) Infrastructure Cell = Base Service Set (BSS): 1 Base station required Extended multi-cell service = Extended Service Set (ESS): Base station is connected to wired backbones, or support the bridge function to other BSS requires handoff management Basic Service Set (BSS) The basic building block of WLAN is the BSS BSS represents the coverage area where two or more stations (called STAi) communicate through a set of functions via the wireless connection A synonim of BSS is Ad Hoc Network Luciano Bononi 2002 Luciano Bononi 2002

Extended Service Set (ESS) [1] A BSS may be part of a extended network that is build connecting multiple AdHoc networks with a named Distribution System (DS) The DS may consist of wired and/or wireless connections Inside each BSS, the station Adapter connecting the BSS to the DS is named Access Point (AP). Extended Service Set (ESS) [2] The DS and BSSs allow to create a wireless network of arbitrary size and complexity: ESS To access a wired network from the wireless one, the communication has to go through a portal which provides the integration between the two communication systems The portal (that could be integrated in the functionality of an AP) forms the internetworking unit to other LANs Extended Service Set (ESS) [3] : Distribution System (DS) AP: Access Point BSS: Basic Service Set ESS: Extended Service Set DS: Network to transmit packets between BSSs to realize ESSs. Portal: logical entity to integrate IEEE 802.11 network and the distribution system (dedicated device or access point) Protocol architecture [1] The fits into other standards for wired LANs The most common scenario is that of a IEEE 802.11 wireless LAN connected to an IEEE 802.3 Ethernet via a bridge Applications should not notice any differences. The higher layers (application, TCP, IP) look the same for the wireless node as for the wired node

Protocol architecture [2] Protocol architecture [3] Application TCP IP Application TCP IP The standard only covers the PHY layer and the MAC layer LLC 802.11 MAC 802.11 PHY LLC 802.11 MAC 802.3 MAC 802.11 PHY 802.3 PHY LLC 802.11 MAC 802.11 PHY The PHY is subdivided into a physical layer convergence protocol (PLCP) and the physical medium dependent sublayer (PMD) The upper part of the data link control layer, the Logical Link Control (LCC) covers the differences of the Medum Access Control (MAC) layers needed for the different media PLCP provides a carrier sense signal called clear channel signal (CCA) and a common PHY service access point (SAP) independent of the transmission technology PMD handles modulation and encoding/decoding of signals Protocol architecture [3] Physical layer The MAC management supports the association and re-association of a STA to an AP and roaming between different AP controls authentication mechanisms, encryption, synchronization of a STA with regard to an AP Controls power management to save battery power Three different physical layers: one layer based on infrared and two layers based on radio transmission All layers including the provision of the CCA signal and a SAP The CCA signal is needed for the MAC mechanism controlling medium access and indicates if the medium is currently idle The SAP give to the MAC layer a transfer rate of 1 or 2 Mbps

MAC layer [1] MAC layer [2] Has to control: Medium access Support for roaming Authentication Power conservation The basic services provided by the MAC layer are the mandatory asynchronous data service and the optional time-bounded service In an AdHoc network only the asynchronous service is provided, Distributed Coordination Function (DCF) Both services for infrastructure-based networks, Point Coordination Function (PCF) Distributed Coordination Function (DCF) DCF is mandatory With DCF, 802.11 STAs contend for access and attempt to send frames when there is no other station transmitting. If another station is sending a frame, stations are polite and wait until the channel is free. Point Coordination Function (PCF) Provide support for time-bounded delivery of data frames the AP grants access to an individual STA to the medium by polling the station during the contention free period. STAs can't transmit frames unless the access point polls them first. Physical layer [1] aims at so call AdHoc piconets: LAN networks with a very limited coverage without the need for an infrastructure One goal of is to provide local wireless access at very low costs It is a radio-based technology User scenarios: Connection of peripheral devices Support of ad hoc networking Bridging of networks Several limitations: Battery power: bluetooth devices will be integrated into typical mobile devices --> small, low power chips Combined use for voice and data transmission --> support for multimedia data

Physical layer [2] uses a frequency hopping/time-division duplex scheme The transmission takes place with a fast hopping rate of 1600 hops per second The time between two hops is called a slot Each slot uses a different frequency All devices using the same hopping sequence with the same phase form a piconet Physical layer [3] Relying on battery power it defines several low-power states for the device Every device which is currently not partecipating to a piconet is in STANDBY mode: listening for paging messages periodically The device listen to a subset of hop carries called wake-up carries (wake-up hop sequence is 32 hop in length and is cyclic) The subset of wake-up carriers is chosen basing on the device s identity Physical layer [4] The device visits every hop carrier of the wake-up carriers It correlates the incoming signal with the access code for the piconet derived from its own identity If the correlator triggers the device activates itself Physical layer [5] Any device can initiate a connection (): It sends a page messages if it knows the address of the receiver It sends inquiry messages followed by a page message if it does not know the address of the receiver The unit sends 16 identical page messages on 16 different hop frequencies defined for the device to be paged (slave) If the slave does not respond the sends page messages on the remaining 16 wake-up hop carriers

Physical layer [6] To save battery power a device can go into one of three low-power states: PARK state: lowest duty cycle. It releases its MAC address but remains synchronized with the piconet. It occasionally listens to the traffic of the HOLD state: little higher power consumption. It does not release its MAC address SNIFF state: highest power consumption. It listen at the piconet at a reduced rate. The interval for listening can be programmed (application dependent MAC layer [1] In a piconet we have one device acting as a, all other devices (up to 7) act as slaves The determines the hopping sequence using its unique identifier and the phase of the sequence using its internal clock Within a piconet the controls the medium access using a polling and reservation scheme Two services: MAC layer [2] Synchronous connection-oriented link (SCO): standard telephone connections require symmetrical, cyrcuit switching, point-to-point connections. (here the uses a reservation scheme) Asynchronous connectionless link (ACL): typical data applications require symmetrical or asymmetrical, packet switched, point-tomultipoint trasfers. (here the uses a polling scheme) Networking [1] All users within one piconet share the same 1 MHz channel As more users join the piconet, the throughput per user drops quickly We can form groups of piconets called scatternet

Networking [2] Networking [3] Three piconets in which two devices partecipate in two different piconets All three piconets use different hopping sequence All piconets can share the total bandwidth available Adding more piconets leads to have more and more collision in a single piconets: a collision occurs if two or more piconets use the same carrier frequency for a slot piconets If a device wants to partecipate in more than one piconet it has to synchronize to the hopping sequence of the piconet it wants to take part in If a device acts as slave in one piconet it simply starts to synchronize with the hopping sequence of the piconet it wants to join piconets Networking [4] Networking [5] After the synchronization it acts as a slave in this piconet and does not partecipate in the former any longer To enable synchronization it has to know the identity of the of the piconet Before leaving one piconet a slave informs the current that it will be unavailable for a certain amount of time piconets A can also leave its piconet and act as a slave in another piconet A of a piconet cannot act as in another piconet piconets unavailable

Networking [5] References As soon as leaves the piconet, all traffic within this is suspended until the returns Communication between different piconets takes place through devices jumping back and forth between these nets piconets Mobile Communications, Jochen Schiller, chapter 7 Wireless LAN, Addison Wensley 2000 slave suspended