Wireless LANs! Wireless LAN Applications: - LAN Extension: - Cross-Building Interconnect: - Nomadic Access: - Ad-Hoc Networking:

Similar documents
IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

Wiereless LAN

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

CSMA/CA. Information Networks p. 1

IEEE WIRELESS LAN STANDARD

IEEE Technical Tutorial. Introduction. IEEE Architecture

A Technical Tutorial on the IEEE Protocol

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Chapter 7 Low-Speed Wireless Local Area Networks

Basic processes in IEEE networks

... neither PCF nor CA used in practice

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

IEEE Wireless LAN Standard. Updated: 5/10/2011

IEEE WLAN (802.11) ...Copyright. Renato Lo Cigno

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

IEEE Wireless LAN

Lecture 17: Wireless Networking"

Overview of Networks and Standards

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Medium Access Control (MAC) and Wireless LANs

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

WI-FI TECHNOLOGY: SECURITY ISSUES

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Wireless Local Area Networks and the Standard

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

An Overview of Wireless LAN Standards IEEE and IEEE e

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

MAC Algorithms in Wireless Networks

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

Wireless Personal Area Networks (WPANs)

Mustafa Ergen June 2002 Department of Electrical Engineering and Computer Science University of California Berkeley

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

Introduction to IEEE Wireless LAN

11/22/

Adaptive DCF of MAC for VoIP services using IEEE networks

Ph.D. Thesis. Resources optimization in multimedia communications. Luca Sanna Randaccio. Advisor: Prof. Luigi Atzori

10. Wireless Networks

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Wireless LAN Pen-Testing. Part I

ECE/CS 372 introduction to computer networks. Lecture 13

IEEE frame format

TCP in Wireless Networks

CSE 123A Computer Networks

IEEE Wireless Local Area Networks

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

Lecture 7 Multiple Access Protocols and Wireless

ECE 428 Computer Networks and Security

The Wireless Network Road Trip

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Philippe Klein. avb-phkl qos-overview

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

Mobile Ad Hoc Networks

Hello viewers, welcome to today s lecture on cellular telephone systems.

COMP 3331/9331: Computer Networks and Applications

WPAN. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

How To Secure Wireless Networks

Department of Computer Science Columbia University

Video Transmission over Wireless LAN. Hang Liu

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

EETS 8316 Wireless Networks Fall 2013

How To Analyze The Security On An Ipa Wireless Sensor Network

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

The IEEE standard

Wireless LAN Concepts

CS263: Wireless Communications and Sensor Networks

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Measuring the service level in the 2.4 GHz ISM band

CS 356 Lecture 29 Wireless Security. Spring 2013

TL-WN310G 54M Wireless CardBus Adapter

EPL 657 Wireless Networks

Improving The Security of Wireless LANs By Managing 802.1x Disassociation

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Tecnologías Inalámbricas.

Algorithms for Interference Sensing in Optical CDMA Networks

In this Lecture" Access method CDMA" Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications

Security in IEEE WLANs

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

This tutorial has been prepared for readers to help them understand the concepts related to WiFi.

How To Determine The Capacity Of An B Network

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

IEEE e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

How To Configure the WLAN with QoS

Real-Time Communication in IEEE Wireless Mesh Networks: A Prospective Study

Introduction to Ad hoc Networks

CDMA TECHNOLOGY. Brief Working of CDMA

Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello

ETSF05 Internet Protocols PPP TDM Synchronous Optical Networks xdsl WLAN

How b/g WLAN and Bluetooth Can Play

Multiple WiFi Clients on a Single Wireless Card

An Investigation of the Impact of Signal Strength on Wi-Fi Link Throughput through Propagation Measurement. Eric Cheng-Chung LO

Transcription:

Wireless LANs! Wireless LAN Applications: - LAN Extension: - Cross-Building Interconnect: - Nomadic Access: - Ad-Hoc Networking: Wireless-1

Additional Wireless LAN Configurations Wireless-2

Additional Wireless LAN Configurations cont. Wireless-3

Wireless LAN Technologies Wireless-4

Infrared LANs! Transmission Techniques: - Direct Beam Infrared - Omnidirectional - Diffused Wireless-5

Spread Spectrum LANs! Spread Spectrum communications was initially developed for military and intelligence requirements.! The essential idea is to spread the information signal over a wider bandwidth in order to make jamming and interception more difficult.! More recently, spread spectrum techniques are being used in commercial wireless communication systems (e.g., telephony, LANs).! Spread Spectrum Methods: - Frequency Hopping (FH) Modulation - Direct Sequence (DS) Modulation Wireless-6

Frequency Hopping (FH) Modulation! The signal is broadcast over a pseudorandom series of frequencies.! A receiver hopping in synchronization with the transmitter, picks up the message.! An eavesdropper hears only unintelligible blips.! Fast Frequency Hopping: - One or mode hops per data symbol.! Slow Frequency Hopping: - More than one symbol per hop. Wireless-7

Frequency Hopping Spread Spectrum System Wireless-8

Direct Sequence (DS) Modulation! Each bit in the original signal is modulated by a higher rate pseudorandom bit stream! The pseudorandom code is known as the chipping code and runs at the chip rate.! The receiver knows the chipping code and uses a correlator to receive the transmitted data. Wireless-9

Direct Sequence Spread Spectrum System Wireless-10

Spectrum of a Direct Sequence Spread Spectrum Signal Wireless-11

IEEE 802.11 Wireless LAN Standard! Service Sets: - BSS (Basic Service Set): Consists of a number of stations executing the same MAC protocol sharing the same medium. - ESS (Extended Service Set): Two or more interconnected BSSs.! Station Types (based on mobility): - No Transition station stays within its own BSS. - BSS Transition station moves between BSSs in a single ESS. - ESS Transition station moves between multiple ESSs. Wireless-12

IEEE 802.11 Services! Association: Establishes an association between a station and an access point. The identity and address of the station become known to the access point.! Reassociation: Enables an established association to be transferred from one access point to another access point. This allows a mobile station to move from one BSS to another.! Disassociation: A notification from either a station or an access point that an existing association is terminated. A station should give this notification before leaving an ESS or shutting down.! Authentication: Establishes the identity of stations to each other.! Privacy: Used to prevent the contents of messages from being read by other than the intended recipient. (uses encryption) Wireless-13

IEEE 802.11 Physical Medium Specification! Infrared at 1Mbps and 2Mbps operating at a wavelength between 850nm and 950nm.! Direct Sequence Spread Spectrum operating in the 2.4GHz ISM band. Up to seven channels, each with a data rate of 1Mbps or 2Mbps, can be used.! Frequency Hopping Spread Spectrum operating in the 2.4GHz ISM. Details are for further study. Wireless-14

IEEE 802.11 Protocol Architecture! Distributed Coordination Function (DCF): - uses CSMA contention to provide access to all stations! Point Coordination Function (PCF): - provides contention-free access using polling. Wireless-15

Distributed Coordination Function (DCF)! Uses CSMA contention to provide access to all stations. (Note: no CD)! To insure fairness, DCF includes a set of delays that provide a priority scheme.! A station with a frame to transmit, senses the medium. If idle, it waits to see if the medium remains idle for a time equal to IFS (interframe space). If yes, the station transmits.! If the medium is busy, (either initially or it became busy within IFS), the stations defers transmission and continues to monitor the medium until the current transmission is over.! Once the current transmission ends, the station delays another IFS. If the medium remains idle, the station backs off using a binary exponential backoff scheme and again senses the medium. if the medium is still idle, the station transmits.! Types of IFS: - SIFS (short IFS): The shortest IFS. Used for all immediate response actions. - PIFS (PCF IFS): A midlength IFS. Used by the centralized controller in the PCF scheme when issuing polls. - DIFS (DCF IFS): The longest IFS. Used as a minimum delay for asynchronous frames contending for access.! Any station using SIFS has, in effect, highest priority. SIFS is used for: - Acknowledgement (ACK): to ACK a received unicast frame. - Clear to send (CTS): sent in response to a Request to Send frame (RTS) to indicate station's readiness to receive a data frame. - Poll Response: used in the PCF. Wireless-16

IEEE 802.11 MAC Timing Wireless-17

Point Coordination Function (PCF)! PCF is an alternate access method on top of DCF.! Uses polling by the centralized polling master (point coordinator).! PIFS is used when issuing polls. This locks out asynchronous traffic during the polling and response process.! To prevent the lockout of all asynchronous traffic, an interval known as a superframe is used.! During the first part of the interval, the point coordinator issues polls in a round-robin fashion to all stations configured for polling. The point coordinators idles for the remainder of the interval, allowing a contention period for asynchronous traffic. Wireless-18

IEEE 802.11 MAC Frame Structure! Frame Control (2 octets): Indicates type of frame and provides control information.! Duration/Connection ID (2 octets): As a duration field, it indicates the time (in microseconds) the channel will be allocated for successful transmission of a MAC frame. In some control frames, this field contains an association or connection identifier.! Addresses (6 octets each): The number of and meaning is context dependent. types include: source, destination, transmitting station, and receiving station.! Sequence Control (2 octets): 4-bit fragment number: for fragmentation of frames. 12-bit frame sequence number between sender and receiver.! Frame Body 90 to 2312 octets): Contains an LLC PDU or MAC control information.! Frame Check Sequence (4 octets): 32-bit CRC.! Frame Control Field - Protocol Version (2 bits): currently version 0 - Type (2 bits): control, management, or data. - Subtype (4 bits): - To DS (1 bit): frame to the distribution system. - From DS (1 bit): frame leaving the distribution system. - More Fragment (1 bit): if set to 1, more fragments to follow - Retry (1 bit): set to 1 to indicate retransmission. - Power Management (1 bit): set to indicate sender in sleep mode. - More Data (1 bit): set to 1 to indicate that station has more data to send. - Wired Equivalent Privacy (WEP) bit (1 bit): set if WEP protocol in use. Used to exchange encryption keys. - Order (1 bit): set in any data frame sent using the Strictly Ordered service. This service tells the receiving station that frames must be processed in order. Wireless-19