Académique Documents
Professionnel Documents
Culture Documents
Wireless: 802.11
802.15, 802.15.4
802.16
Wireless: 802.11
Wireless LAN
In Wireless LAN, a host is connected to a base station or to another wireless host through a
wireless communication link within LAN.
WLAN is one of the fastest growing technologies.
WLAN CONFIGURATIONS
In Wireless LANs can operate in one of the two following configurations:
1. Infrastructure based
2. Ad-hoc networking based
Base station
A base station is responsible for sending and receiving data to and form a wireless host that is
associated with that base station.
Usually, the base station has no mobility but has a wired connection to the internet or other
networks. The node at the other end of the wireless link is a client node, which is often mobile.
Advantages of WLAN
Flexibility
Planning
Design
Cost
Robustness
Disadvantages of WLAN
Quality of service
Restrictions
Security
Bit error rate
Decreasing signal strength
Wireless Technologies
Wi-fi (IEEE 802.11)
Bluetooth (IEEE 802.15.1)
Third generation (3G) of cellular wireless standards
1.Physical properties
IEEE 802.11 defines a number of different physical layers that operate in various
frequency bands and provide a range of different data rates.
o For collision detection, a station must be able to send data and receive collision signals at
the same time. It will increase the bandwidth requirements.
o Collision may not be detected because of the hidden station problem.
o When there is more distance between the stations, the signal fading could prevent a
station at one end form hearing collision at the other end.
o Components of an 802.11 system
o Stations
Access point (AP)
o Basic service set (BSS)
o Extended service set (ESS)
o Distribution system (DS)
Basic Service Set
Set of stations that communicate with each other
Independent BSS ( IBSS)
When all stations in a BSS are mobile and there is no connection to a wired
network
Typically short-lived with a small number of stations
Ad-hoc in nature
Station s communicate directly with one another
No relay capabilities nodes must be in direct range
Infrastructure BSS (BSS)
Includes an Access Point (AP)
All mobiles communicate directly to AP
AP provides connection to wired LAN and relay functionality
Use of AP may increase BW (2-hop rather than 1-hop data tx)
AP provides central control, allows packet buffering, etc.
The IEEE 802.11a, which delivers upto 54 Mbps using variant for FDM called orthogonal
frequency division multiplexing (OFDM) and also runs in the license frequency band of 5-Ghz.
The IEEE 802.11b provides data rate upto 11Mpbs and use 2.4 Ghz ISM DS-SS Technique.
MIMO is a wireless networking standard that uses multiple antennas both for transmitting
as well as receiving to increase data rates and allowing greater wireless channels
bandwidth.
2.Collision avoidance
1.Hidden node (station) problem
2.Exposed node problem
3.CSMA/CA
The Hidden Node Problem. Although A and C are hidden from each other, their signals
can collide at B. (Bs reach is not shown.)
Exposed Node Problem. Although B and C are exposed to each others signals, there is
no interference if B transmits to A while C transmits to D. (A and Ds reaches are not
shown.)
3.CSMA/CA
802.11 addresses these two problems with an algorithm called Multiple Access with
Collision Avoidance (MACA). The idea is for the sender and receiver to exchange
control frames with each other before the sender actually transmits any data.
This exchange informs all nearby nodes that a transmission is about to begin.
Specifically, the sender transmits a Request to Send (RTS) frame to the receiver; the RTS
frame includes a field that indicates how long the sender wants to hold the medium (i.e.,
it specifies the length of the data frame to be transmitted).
The receiver then replies with a Clear to Send (CTS) frame; this frame echoes this length
field back to the sender.
Any node that sees the CTS frame knows that it is close to the receiver, and therefore
cannot transmit for the period of time it takes to send a frame of the specified length. Any
First, the receiver sends an ACK to the sender after successfully receiving a frame. All
nodes must wait for this ACK before trying to transmit.
Second, should two or more nodes detect an idle link and try to transmit an RTS frame at
the same time, their RTS frames will collide with each other.
802.11 does not support collision detection, but instead the senders realize the collision
has happened when they do not receive the CTS frame after a period of time, in which
case they each wait a random amount of time before trying again.
The amount of time a given node delays is defined by the same exponential backoff
algorithm used on the Ethernetnode that sees the RTS frame but not the CTS frame is not
close enough to the receiver to interfere with it, and so is free to transmit.
3.Distribution System
Base station which are called as access point (APs) and they are connected to each
other by using distribution system.
1.Scanning
2.Node Mobility
1. Scanning
The technique for selecting an AP is called scanning
o The node selects one of the access points and sends that AP an
Association Request frame.
o The AP replies with an Association Response frame.
2. Node Mobility
This is called active scanning since the node is actively searching for an access point.
APs also periodically send a Beacon frame that advertises the capabilities of the
access point; these include the transmission rate supported by the AP This is called
passive scanning.
A node can change to this AP based on the Beacon frame simply by sending it an
Association Request frame back to the access point.
6 bit Type field: indicates whether the frame is an RTS or CTS frame or
being used by the scanning algorithm.
How these addresses are interpreted depends on the settings of the ToDS and FromDS
bits in the frames Control field.
This is to account for the possibility that the frame had to be forwarded across the
distribution system which would mean that,
the original sender is not necessarily the same as the most recent transmitting node.
Simplest case.
When one node is sending directly to another, both the DS bits are 0, Addr1 identifies the
target node, and Addr2 identifies the source node.
Indicates that the message went from a wireless node onto the distribution system, and
then from the distribution system to another wireless node.
Addr2 identifies the immediate sender (the one that forwarded the frame from the
distribution system to the ultimate destination).
Addr3 identifies the intermediate destination (the one that accepted the frame from a
wireless node and forwarded across the distribution system)
Bluetooth Architecture
Bluetooth architecture defines two types of networks:
1. Piconet
2. Scattemet
1. Piconet
Piconet is a Bluetooth network that consists of one primary (master) node and seven
active secondary (slave) nodes.
Thus, piconet can have upto eight active nodes (1 master and 7 slaves) or stations
within the distance of 10 meters.
There can be only one primary or master station in each piconet.
The communication between the primary and the secondary can be one-to-one or one-
to-many.
All communication is between master and a slave. Salve-slave communication is not
possible.
In addition to seven active slave station, a piconet can have upto 255 parked nodes.
These parked nodes are secondary or slave stations and cannot take part in
communication until it is moved from parked state to active state.
2. Scatternet
Scattemet is formed by combining various piconets.
A slave in one piconet can act as a master or primary in other piconet.
Such a station or node can receive messages from the master in the first piconet and
deliver the message to its slaves in other piconet where it is acting as master. This node
is also called bridge slave.
Thus a station can be a member of two piconets.
A station cannot be a master in two piconets.
Radio Layer
The Bluetooth radio layer corresponds to the physical layer of OSI model.
It deals with ratio transmission and modulation.
The radio layer moves data from master to slave or vice versa.
It is a low power system that uses 2.4 GHz ISM band in a range of 10 meters.
This band is divided into 79 channels of 1MHz each. Bluetooth uses the Frequency
Hopping Spread Spectrum (FHSS) method in the physical layer to avoid interference
from other devices or networks.
Bluetooth hops 1600 times per second, i.e. each device changes its modulation
frequency 1600 times per second.
In order to change bits into a signal, it uses a version of FSK called GFSK i.e. FSK with
Gaussian bandwidth filtering.
Baseband Layer
Baseband layer is equivalent to the MAC sublayer in LANs.
Bluetooth uses a form of TDMA called TDD-TDMA (time division duplex TDMA).
Master and slave stations communicate with each other using time slots.
The master in each piconet defines the time slot of 625 sec.
In TDD- TDMA, communication is half duplex in which receiver can send and receive
data but not at the same time.
If the piconet has only no slave; the master uses even numbered slots (0, 2, 4, ...) and
the slave uses odd-numbered slots (1, 3, 5, .... ). Both master and slave communicate in
half duplex mode. In slot 0, master sends & secondary receives; in slot 1, secondary
sends and primary receives.
If piconet has more than one slave, the master uses even numbered slots. The slave
sends in the next odd-numbered slot if the packet in the previous slot was addressed to
it.
In Baseband layer, two types of links can be created between a master and slave. These
are:
1. Asynchronous Connection-less (ACL)
It is used for packet switched data that is available at irregular intervals.
ACL delivers traffic on a best effort basis. Frames can be lost & may have to be
retransmitted.
A slave can have only one ACL link to its master.
Thus ACL link is used where correct delivery is preferred over fast delivery.
The ACL can achieve a maximum data rate of 721 kbps by using one, three or more
slots.
2. Synchronous Connection Oriented (SCO)
sco is used for real time data such as sound. It is used where fast delivery is preferred
over accurate delivery.
In an sco link, a physical link is created between the master and slave by reserving
specific slots at regular intervals.
Damaged packet; are not retransmitted over sco links.
A slave can have three sco links with the master and can send data at 64 Kbps.
Logical Link, Control Adaptation Protocol Layer (L2CAP)
The logical unit link control adaptation protocol is equivalent to logical link control
sublayer of LAN.
The ACL link uses L2CAP for data exchange but sco channel does not use it.
The various function of L2CAP is:
1. Segmentation and reassembly
L2CAP receives the packets of upto 64 KB from upper layers and divides them into
frames for transmission.
It adds extra information to define the location of frame in the original packet.
The L2CAP reassembles the frame into packets again at the destination.
2. Multiplexing
L2CAP performs multiplexing at sender side and demultiplexing at receiver side.
At the sender site, it accepts data from one of the upper layer protocols frames them
and deliver them to the Baseband layer.
At the receiver site, it accepts a frame from the baseband layer, extracts the data, and
delivers them to the appropriate protocol1ayer.
3. Quality of Service (QOS)
L2CAP handles quality of service requirements, both when links are established and
during normal operation.
It also enables the devices to negotiate the maximum payload size during connection
establishment.
Bluetooth Frame Format
The various fields of blue tooth frame format are:
Access Code: It is 72 bit field that contains synchronization bits. It identifies the
master.
2. Header: This is 54-bit field. It contain 18 bit pattern that is repeated for 3 time.
The header field contains following subfields:
(i) Address: This 3 bit field can define upto seven slaves (1 to 7). If the address is zero,
it is used for broadcast communication from primary to all secondaries.
(ii)Type: This 4 bit field identifies the type of data coming from upper layers.
(iii) F: This flow bit is used for flow control. When set to 1, it means the device is unable
to receive more frames.
(iv) A: This bit is used for acknowledgement.
(v) S: This bit contains a sequence number of the frame to detect retransmission. As
stop and wait protocol is used, one bit is sufficient.
(vi) Checksum: This 8 bit field contains checksum to detect errors in header.
3. Data: This field can be 0 to 2744 bits long. It contains data or control information
coming from upper layers
WiMAX(802.16) is
Acronym for Worldwide Interoperability for Microwave Access.
A WiMAX receiver.
The WiMAX base stations would use the MAC layer defined in the standard,
a common interface that makes the networks interoperable and would
allocate uplink and downlink bandwidth to subscribers according to their
needs, on an essentially real-time basis.
Each base station provides wireless coverage over an area called a cell.
Theoretically, the maximum radius of a cell is 50 km or 30 miles however,
practical considerations limit it to about 10 km or 6 miles.
WiMAX Receiver
A WiMAX receiver may have a separate antenna or could be a stand-alone
box or a PCMCIA card sitting in your laptop or computer or any other
device. This is also referred as customer premise equipment (CPE).
Mobile Stations (MS) used by the end user to access the network.
The access service network (ASN), which comprises one or more base
stations and one or more ASN gateways that form the radio access network
at the edge.
The network reference model developed by the WiMAX Forum NWG defines
a number of functional entities and interfaces between those entities. The
following figure shows some of the more important functional entities.
Base station (BS) The BS is responsible for providing the air interface to
the MS. Additional functions that may be part of the BS are micro mobility
management functions, such as handoff triggering and tunnel
establishment, radio resource management, QoS policy enforcement, traffic
classification, DHCP (Dynamic Host Control Protocol) proxy, key
management, session management, and multicast group management.
WiMAX - Technology
WiMAX is a technology based on the IEEE 802.16 specifications to enable
the delivery of last-mile wireless broadband access as an alternative to
cable and DSL. The design of WiMAX network is based on the following
major principles
Spectrum able to be deployed in both licensed and unlicensed spectra.
Transmission Media
For any networking to be effective, raw stream of data is to be
transported from one device to other over some medium. Various
transmission media can be used for transfer of data. These transmission
media may be of two types
Each twisted pair and then all the pairs are shielded.
Such twisted pairs are called shielded twisted pair (STP) cables. The
wires that are not shielded but simply bundled together in a protective
sheath are called unshielded twisted pair (UTP) cables. These cables
can have maximum length of 100 metres.
Shielding makes the cable bulky, so UTP are more popular than STP. UTP
cables are used as the last mile network connection in homes and offices.
Coaxial Cable
Coaxial cables are copper cables with better shielding than twisted pair
cables, so that transmitted signals may travel longer distances at higher
speeds. A coaxial cable consists of these layers, starting from the innermost
Coaxial cables are widely used for cable TV connections and LANs.
Advantages of Coaxial Cables
These are the advantages of coaxial cables
Signals can travel longer distances at higher speeds, e.g. 1 to 2 Gbps for 1
Km cable
Note that both core and cladding are made of similar material. However,
as refractive index of the cladding is lower, any stray light wave trying to
escape the core is reflected back due to total internal reflection.
Optical fibre is rapidly replacing copper wires in telephone lines, internet
communication and even cable TV connections because transmitted data
can travel very long distances without weakening. Single node fibre optic
cable can have maximum segment length of 2 kms and bandwidth of up to
100 Mbps. Multi-node fibre optic cable can have maximum segment length
of 100 kms and bandwidth up to 2 Gbps.
High bandwidth
Light waves are unidirectional, so two frequencies are required for full duplex
transmission
Infrared
Low frequency infrared waves are used for very short distance
communication like TV remote, wireless speakers, automatic doors, hand
held devices etc. Infrared signals can propagate within a room but cannot
penetrate walls. However, due to such short range, it is considered to be
one of the most secure transmission modes.
Radio Wave
Transmission of data using radio frequencies is called radio-wave
transmission. We all are familiar with radio channels that broadcast
entertainment programs. Radio stations transmit radio waves
using transmitters, which are received by the receiver installed in our
devices.