1
Motivation
2
Wireless Data Networks
Wireless WANs (Mobile Data Network)
Voice-Oriented: GSM, CDMA
Data-Oriented: Mobitex, D-AMPS
Voice/Data Mixed: IMT-2000
Wireless LANS
Data-Oriented: IEEE 802.11, Hyperlan
Wireless Local Loop (IEEE 802.16)
Data/Voice-Oriented:WiMax
Wireless PANS (IEEE 802.15)
Data/Voice-Oriented:Bluetooth
3
Wireless Data Services
4
Wireless Data Network Categories
Infrared (IR) LANs (1-10 Mbps)
Direct beam and diffused
Spread spectrum LANs (1-54 Mbps)
IEEE802.11, 802.15(PAN),Bluetooth
Narrowband microwave (100 Mbps)
IEEE802.16 (WiMAX)
Applications:
LAN Extension -WLAN
Wireless Broadband Access
Nomadic Access
Ad hoc Networking
5
Data vs. Voice
“voice traffic changes into data traffic”
6
Wireless LAN Configuration
7
IEEE802 Standard Series
8
IEEE802 Standard Series
802.1: Higher level interface (HILI)
802.2: Logical Link Control
802.3: CSMA/CD Ethernet (10Mbps)
802.4: Token Bus
802.5: Token Ring
802.6: MAN
802.7: Broadband Technical Advisory Group
802.8: Fiber Optics Technical Advisory Group
802.9: Integrated Service LAN Interface
802.10: Standard for Interoperable LAN Security
802.11: Wireless LANs
802.12: Demand Priority
802.14: Cable TV Based Broadband Communication Networks
9
Challenges in WLANs
Multiple devices need to share the “ether
channel” efficiently
Problems: interference, contention, access control,
channel quality varies over space and time
Different service requirements
Voice (real-time, reservation-based)
Data (best effort, reliable deliver)
Different approaches and trade-offs
“Centralized vs. Distributed”
Other challenges
Mobility
Power conservation
Security considerations
10
Challenges in WLANs
Intrinsic Problems
Multi-path
Hidden terminals
Burst errors
Near-far: If two terminals at different distances
from the receiver start transmission at the same
power simultaneously, the receiver will get more
power from the nearer transmitter. The SNR of the
farther transmitter may get below detection in some
cases and as a result, the communication channel
may be jammed.
11
Random Access Methods
Fixed access techniques (FDMA,TDMA and
CDMA) are inefficient in transmitting bursty
data!
The random access techniques are used in
mobile data networks, which can be divided
into two groups:
12
Pure ALOHA
13
Slotted ALOHA
14
Reservation Based ALOHA
15
CSMA: Listen-before-talk
16
CSMA/CA
17
Performance of Random Access Methods
18
Hidden Terminals
19
History of IEEE802.11
1987: Started as 802.4L
1989: Moved to 802.11
1997: MAC & PHY for 1&2Mbps at
2.4GHz
1999 (a, b): PHY for 11Mbps at 2.4GHz
(3 Ch) and 54Mbps at 5GHz (12 ch)
2000 (c, d): Supplement to 802.1d
bridges. Dynamic regulatory domain
update
Current (e, g, h, i, j, k, m, n, p, r, s)
20
IEEE 802.11 WLAN Standard
Activities
802.11a: 5 GHz, 54 Mbps
802.11b: 2.4 GHz, 11 Mbps
802.11d: Multiple regulatory domains
802.11e: Quality of Service (QoS)
802.11f: Inter-Access Point Protocol (IAPP)
802.11g: 2.4 GHz, 54 Mbps
802.11h: Dynamic Frequency Selection (DFS) and Tran Power
802.11i: Security – Ratified | WPAv2 – Draft 9
802.11j: Japan 5 GHz Channels (4.9-5.1 GHz)
802.11k: Measurement
802.11m: Maintenance
802.11n: High Throughput
802.11p: Wireless Access for Vehicular Environment
802.11r: Public WLAN Fast Roaming
802.11s: Mesh Networking
21
Overview of IEEE802.11
Architecture
Uses CSMA/CD MAC, RTS/CTS with
optional PCF supporting all three PHYs
22
Terminologies
Access Point (AP)
Provides access to distribution services via the wireless medium
Basic Service Area
The coverage area of one access point
Basic Service Set (BSS)
A set of stations controlled by one access point
Distribution System (DS)
The fixed (wired) infrastructure used to connect a set of BSS to
create an extended service set (ESS)
Portal(s)
The logical point(s) at which non-802.11 packets enter an ESS
MAC Protocol Data Unit (MPDU)
Packets that describe protocol
MAC Service Data Unit (MSDU)
Packets that describe service
23
Architecture/Reference Model
24
IEEE802.11 Protocols in Context
25
IEEE 802.11 Protocol Layers
26
Sub-layer Responsibilities
LLC: Provide an interface to higher layers and
performs flow and error control
MAC Sublayer: access mechanism, data
format
MAC Management: roaming in ESS, power
management, and security.
PLCP: carrier sensing assessment, forming
packets for PHYs
PMD: modulation and coding
PHY Layer Management: channel tuning
Station Management: interacts with MAC
and PHY
27
Detailed View of Protocol
Architecture
28
Physical Layer in 802.11
Three options
Frequency Hopping Spread Spectrum (FHSS)
Direct Sequence Spread Spectrum (DSSS)
Diffused Infra Red (DFIR) – not widely used.
29
IEEE 802.11a and IEEE 802.11b
IEEE 802.11a
Makes use of 5-GHz band
Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54 Mbps
Uses orthogonal frequency division multiplexing (OFDM)
Sub-carrier modulated using BPSK, QPSK, 16-QAM or 64-QAM
IEEE 802.11b
Provides data rates of 5.5 and 11 Mbps
Complementary code keying (CCK) modulation scheme based
on DSSS
30
IEEE 802.11g
IEEE 802.11g
Up to 54 or 108 Mpbs at 2.4GHz
Mandatory backward compatibility with IEEE802.11b
Mandatory OFDM and CCK
Optional CCK- OFDM and PBCC (Packet Binary Convolutional
Code)
31
MAC Layer Functionality
MAC Sublayer
Format of messages (data and control)
Access control/mechanisms
1. Contention Mode
For access to the channel by multiple contending
devices
2. Contention-free schemes
RTS (Ready –To-Send)/CTS (Clear-To-Send) – tackle
the hidden terminal problem
DATA and PCF for time bounded access
MAC Management
Roaming support in the ESS, power
management and security
32
MAC Timing: Basic Access Method
For CSMA/CA, we have inter-frame spacing IFS.
As per the priority level of the packet, the IFS is
divided into three categories
DCF-IFS (DIFS): used for contention, lowest priority, longest
delay.
PCF-IFS (PIFS): for medium priority and medium delay.
Short-IFS (SIFS) used for high priority such as ACKs, CTS,
etc. has the lowest duration time and delay.
33
Distributed Coordination Function
(DCF)
Use CSMA/CA Algorithm based on Inter-frame Space
(IFS):
34
CSMA/CA with ACK in
an Infrastructure Network
35
RTS /CTS Mechanism
36
Wired Equivalent Privacy
37
Wired Equivalent Privacy
38
WiFi Protected Access (WPA) /
IEEE802.11i
39