SlideShare une entreprise Scribd logo
1  sur  37
Télécharger pour lire hors ligne
WLAN – IEEE 802.11
IEEE 802.11




802.11 standard only covers the physical layer PHY
and medium access layer MAC.
PHY divided into two sublayers :−
−





Physical layer convergence protocol (PLCP)
Physical medium dependent (PMD)

PLCP – it provides a carrier sense signal called
clear channel assessment (CCA), and provides a
common PHY service access point (SAP).
PMD – handles modulation and encoding
/decoding of signals.
Cont..


MAC – support the association and re-association
of a station to an access point and roaming between
different access point ,control
authentication,encryption, synchronization and
power management.
PHY Layer


802.11 supports three versions of PHY layer
−

FHSS – Frequency hopping spread spectrum

−

DSSS – Direct sequence spread spectrum

−

Infra red

[Spread Spectrum-techniques involve spreading the bandwidth
needed to transmit data.]
FHSS Frame Structure











Synchronization – 80 bit SYN (010101....), used to
SYN potential receiver.
Start frame delimiter (SFD) – indicate the start of
frame.
PLCP_PDU length word (PLW) – length of payload
PLCP Signalling field (PSF) – indicate data rate of
payload 0000 – 1Mbits/sec, granularity 500 Kbits/sec.
Header error check (HEC) – 16 bit checksum
DSSS Frame Structure


Self Study
MAC Layer


Three basic access mechanisms have been
defined for IEEE 802.11:(based on
CSMA/CA,RTS/CTS and polling) :−

First two method summarized as distributed
coordination function (DCF).


−

offers ASYN service and not require any access point
to control.

Third, point coordination function (PCF).


offers both ASYN and time-bounded service but need
an access point to control medium access.
Medium Access and Inter-frame Spacing







Short inter-frame spacing (SIFS) – shortest waiting
for medium access (highest priority) ex. Control msg.
PCF inter-frame spacing (PIFS) – used for time
bounded services.
DCF inter-frame spacing (DCF) – longest waiting
time and has the lowest priority for medium access.

[Contention – duration in which several nodes try to access
the medium]
Access Mechanism




DFWMAC-DCF using access mechanism
based on CSMA/CA.
Based on random access scheme with
carrier sense and collision avoidance
through random backoff.
Basic DFWMAC-DCF example
DFWMAC-DCF with RTS/CTS




In this,after waiting for DIFS + backoff time , the sender can issue a request
to send(RTS).
RTS will have same priority , it includes the recevier of the data transmission
and whole duration (data frame + ACK).



Other nodes receive this RTS will set its NAV(net allocation vector).



Receiver will answer RTS with CTS message after waiting for SIFS.



This CTS will also include duration of transmission
DFWMAC-PCF with polling



PCF- Point Coordination Function
It requires an access point that controls
medium access and polls the single nodes.
MAC frames



Frame control – serve
several purposes.











Duration/ID – indicating the
period of time in which the
medium is occupied, used to
set the NAV.
Address 1 to 4 – four
address fields contain
standard IEEE 802 MAC
addresses (48 bits each),
meaning of each address is
depend upon the DS bits.
Sequence control – seq.
no used to filter duplicates.











Protocol version – current protocol
version.
Type – function of frame : management
(00), control (01), or data (10) and value
(11) is reserved.
Subtype – subtype for management
frame: (0000) for association req. ,
(1000) beacon , RTS (1011), CTS
(1100).
More fragments – 1 more frag.
Present.
Retry – if retransmission set to 1.
Power Management – set to 1 then
power saver mode.
More data – indicate more data is
present between access point and
station nodes.
Interpretation of MAC addresses









Ad-hoc network – exchange of MAC frame between two
wireless nodes without a distribution system.
Infrastructure network(from AP) – frame physically
originates from an access point.
Infrastructure network (to AP) – station sends a packet to
another station via the access point.
Infrastructure network (within DS) – packet transmitted
between two access points.
BSSID – basic service set ID , DA – destination address , SA – source
address,RA – receiver address , TA – transmitter address.
MAC Management
Perform following tasks:







SYN – finding a wireless LAN, SYN of internal clock,
generation of becon signals.
Power Management – to control, transmitter activity
for power management (periodic sleep,buffering,
without missing a frame).
Roaming – joining a network,changing of access
points,scanning for access points.
Management information base(MIB) – parameters
representing the current state, can be accessed via
standardized protocol : simple network management
protocol (SNMP).
SYN










To SYN clocks of all nodes , timing
synchronization function (TSF).
Within a BSS, timing is conveyed by the
periodic transmissions of a beacon frame.
Beacon contains a timestamp and other
management information used for power
management and roaming.
Transmission of a beacon frame is not always
periodic as it deferred if the medium is busy.
In infra-based network , AP performs SYN by
transmitting the periodic beacon signal.
SYN example





Beacon intervals are not shifted if one beacon is
delayed.
Timestamp of beacon always reflects the real
transmit time, not the scheduled time.
Power Management






Wireless devices are battery powered , i.e power
saving mechanisms are crucial.
Basic idea of power management is to switch off the
transceiver whenever it is not needed.
PM is simple for sending device, but PM for receiver
can't known is advance.



Receiver “walk up” the transceiver periodically.



Power saving includes two states for a station:

Sleep and awake



Buffering of data in sender.
Power Management (Cont.)










Sender communicate with power saving station then
it has to buffer data.
If a station detects that it is a destination of a
buffered packet it has to stay awake until the
transmission takes place.
Walk up at right moment require the timing
synchronization function(TSF).
Power management in infra-based network is
simpler.
Beacon sent by the access point, a traffic indicating
map(TIM) is transmitted.
Power Management example

DTIM – delivery traffic indication map
Power Management in Ad-hoc
Self Study
Roaming


Moving between AP is called roaming.

Steps are as follows :

Check current link quality and scanning for another AP.



Scanning involves the active search for another BSS.
–

Passive scanning means listening into the medium to find
other n/w. i.e receiving beacon msg.

–

Active scanning means also sending a probe

–

and , beacon and prob responses used to join the new BSS



Select the best AP and send association request.



New BSS response the association request
IEEE 802.11b & 802.11a
Self Study
HIPERLAN






HIPERLAN – High Performance Local Area
Network
ETSI (European Telecommunication Standard
Institute) standardized HIPERLAN
HIPERLAN is a WLAN allowing for node
mobility and supporting ad-hoc and
infrastructure-based topologies.
Bluetooth


In 1998 five companies
(Ericsson,Intel,IBM,Nokia,Toshiba) founded
the Bluetooth consortium with the goal of
developing a single-chip,low-cost,radio-based
wireless network technology.
Bluetooth Architecture



Networking
Protocol Stack
Bluetooth Architecture (Networking)








It operate on 79 channels in the 2.4 GHz
band with 1 MHz carrier spacing.
Each device perform frequency hopping
with 1600 hops/s in a random fashion.
Piconet – it is a collection of Bluetooth device
which are SYN to the same hopping
sequence.
Piconet is a collection of devices with different
roles.
Cont.
















One device in piconet is master (M)
All other device connected to the
master are act as a slaves(S).
Two additional devices : parket
devices (P) and stand-by (SB)
P – known but they do not have
connection.
SB – do not participated in the
piconet.
M determine the hopping pattern in
the piconet
Slaves have to SYN to this pattern.
Each piconet has one master and
exctly 7 simultaneous slaves.
Formation of Piconet












As all devices use a same hopping
sequence they must be SYN.
Step 1 Master sending its clock
and device ID .
Step 2 hopping pattern is
determined by the device ID , a 48bit worldwide unique identifier.
Step 3 slaves adjust their internal
clock according to the master and
participated in the piconet.
All active devices are assigned a
3-bit active member address
(AMA).
All parket devices use an 8-bit
parket member address(PMA).
Formation of Scatternet






Groups of piconet called
scatternet.
Many piconet with
overlapping coverage can
form scatternet.
If a device wants to
participate in more then
one piconet, then it has to
SYN to the hopping seq. of
the piconet it wants to take
part in.
Bluetooth (Protocol Stack)


Protocol stack can be divided into two parts





Core specification
Profile specification

Core specification comprise following elements:

Radio



Baseband



Link Manager Protocol





Logical Link Control and adaptation
protocol (L2CAP)
Service discovery protocol
Bluetooth:Protocol
Stack:Core:Radio










It specifies the air interface i.e frequencies,
modulation and transmit power.
Bluetooth uses the license-free frequency
band at 2.4 GHz.
A frequency hopping/time-division duplex
scheme is used for transmission, with a fast
hopping rate of 1600 hops/sec.
A time interval between two hops is 625
mico sec.
Each slot uses different frequency
Bluetooth:Protocol
Stack:Core:Baseband



It manages frequncy hopping ,medium access and also defines the
packet format.



It defines 1-slot, 3-slot and 5 slot for higher data rates.



No frequency hopping is performed within packets.



In above example the master or one out of seven slaves may transmit data
in an alternative fashion.
Bluetooth:Protocol
Stack:Core:Baseband (Cont..)



Components of a bluetooth packet at baseband layer, packet
contains following three fields :





Access code– used for timing SYN and piconet
identification.
Packet header – used for addess, packet type , flow
and error control and checksum.The three bit active
member address (AMA) represent the active address
of the slave.
Payload – up to 343 bytes payload can be
transferred.
Bluetooth:Protocol
Stack:Core:Physical Link


It offers two different types of links:

Synchronous connection-oriented link(SCO)






For this master reserve two consecutive slots
(forward and return slots) at fixed intervals
Master can support upto three simultaneous
SCO links to the same slave or to different
slaves.

Asynchronous connectionless link(ACL)




Data applications , point-to-multipoint
transfer scenarios
Only one ACL links can exist between a master
and slave.
Bluetooth:Example data
transmission







Master always uses the even number of frequency slots ,
odds slots are for the slaves
Every sixth slot is used for an SCO link
ACL link use single or multiple slots providing asymmetric
bandwith
THANK YOU

Contenu connexe

Tendances

3 handoff management
3 handoff management3 handoff management
3 handoff management
వం శీ
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
Hira Shaukat
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 

Tendances (20)

IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
3 handoff management
3 handoff management3 handoff management
3 handoff management
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMS
 
SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Modulation Techniques for Mobile Radio
Modulation Techniques for Mobile RadioModulation Techniques for Mobile Radio
Modulation Techniques for Mobile Radio
 
Lte training session_1
Lte training session_1Lte training session_1
Lte training session_1
 
LTE Air Interface
LTE Air InterfaceLTE Air Interface
LTE Air Interface
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Cdma system
Cdma systemCdma system
Cdma system
 
Cdma2000
Cdma2000Cdma2000
Cdma2000
 
5 g core overview
5 g core overview5 g core overview
5 g core overview
 
Handover
HandoverHandover
Handover
 

En vedette

802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol Map
Chris x-MS
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_kh
Farzad Ramin
 

En vedette (12)

Lan architecture
Lan architectureLan architecture
Lan architecture
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol Map
 
Chap06 ll cprot_03_kh
Chap06 ll cprot_03_khChap06 ll cprot_03_kh
Chap06 ll cprot_03_kh
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 
Chapter#14
Chapter#14Chapter#14
Chapter#14
 
Wireless la ns(wlan) ieee 802
Wireless la ns(wlan)  ieee 802Wireless la ns(wlan)  ieee 802
Wireless la ns(wlan) ieee 802
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
 
CREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your LifeCREATIVITY: Renew Your Thinking, Transform Your Life
CREATIVITY: Renew Your Thinking, Transform Your Life
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
 

Similaire à WLAN - IEEE 802.11

C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Lan
iamtheone90
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdf
arihantmobileselepun
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
Siva Cool
 
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
IEEE 802.11 general questions  Summarize and describe the basic funct.pdfIEEE 802.11 general questions  Summarize and describe the basic funct.pdf
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
arkurkuri
 

Similaire à WLAN - IEEE 802.11 (20)

WLAN
WLANWLAN
WLAN
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
FDDI and SONET by Er.Anup-(IOE)
FDDI and SONET  by Er.Anup-(IOE)FDDI and SONET  by Er.Anup-(IOE)
FDDI and SONET by Er.Anup-(IOE)
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Lan
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdf
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
The osi model layers
The osi model layersThe osi model layers
The osi model layers
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Unit I Wireless Networks.ppt
Unit I Wireless Networks.pptUnit I Wireless Networks.ppt
Unit I Wireless Networks.ppt
 
Mac 802.11
Mac 802.11Mac 802.11
Mac 802.11
 
RK-4 Signaling System.ppt
RK-4 Signaling System.pptRK-4 Signaling System.ppt
RK-4 Signaling System.ppt
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
IEEE 802.11 general questions  Summarize and describe the basic funct.pdfIEEE 802.11 general questions  Summarize and describe the basic funct.pdf
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11
 

Plus de Rahul Hada

Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using Java
Rahul Hada
 
Support formobility
Support formobilitySupport formobility
Support formobility
Rahul Hada
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
Rahul Hada
 

Plus de Rahul Hada (19)

P4 foundation
P4 foundationP4 foundation
P4 foundation
 
P4 foundation
P4 foundationP4 foundation
P4 foundation
 
Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical System
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
Inheritance
InheritanceInheritance
Inheritance
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using Java
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
 
NS3 Overview
NS3 OverviewNS3 Overview
NS3 Overview
 
1 session installation
1 session installation1 session installation
1 session installation
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell Programming
 
Support formobility
Support formobilitySupport formobility
Support formobility
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Quality planning
Quality planningQuality planning
Quality planning
 
Risk
RiskRisk
Risk
 
Risk
RiskRisk
Risk
 

Dernier

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Dernier (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

WLAN - IEEE 802.11

  • 1. WLAN – IEEE 802.11
  • 2. IEEE 802.11   802.11 standard only covers the physical layer PHY and medium access layer MAC. PHY divided into two sublayers :− −   Physical layer convergence protocol (PLCP) Physical medium dependent (PMD) PLCP – it provides a carrier sense signal called clear channel assessment (CCA), and provides a common PHY service access point (SAP). PMD – handles modulation and encoding /decoding of signals.
  • 3. Cont..  MAC – support the association and re-association of a station to an access point and roaming between different access point ,control authentication,encryption, synchronization and power management.
  • 4. PHY Layer  802.11 supports three versions of PHY layer − FHSS – Frequency hopping spread spectrum − DSSS – Direct sequence spread spectrum − Infra red [Spread Spectrum-techniques involve spreading the bandwidth needed to transmit data.]
  • 5. FHSS Frame Structure      Synchronization – 80 bit SYN (010101....), used to SYN potential receiver. Start frame delimiter (SFD) – indicate the start of frame. PLCP_PDU length word (PLW) – length of payload PLCP Signalling field (PSF) – indicate data rate of payload 0000 – 1Mbits/sec, granularity 500 Kbits/sec. Header error check (HEC) – 16 bit checksum
  • 7. MAC Layer  Three basic access mechanisms have been defined for IEEE 802.11:(based on CSMA/CA,RTS/CTS and polling) :− First two method summarized as distributed coordination function (DCF).  − offers ASYN service and not require any access point to control. Third, point coordination function (PCF).  offers both ASYN and time-bounded service but need an access point to control medium access.
  • 8. Medium Access and Inter-frame Spacing    Short inter-frame spacing (SIFS) – shortest waiting for medium access (highest priority) ex. Control msg. PCF inter-frame spacing (PIFS) – used for time bounded services. DCF inter-frame spacing (DCF) – longest waiting time and has the lowest priority for medium access. [Contention – duration in which several nodes try to access the medium]
  • 9. Access Mechanism   DFWMAC-DCF using access mechanism based on CSMA/CA. Based on random access scheme with carrier sense and collision avoidance through random backoff.
  • 11. DFWMAC-DCF with RTS/CTS   In this,after waiting for DIFS + backoff time , the sender can issue a request to send(RTS). RTS will have same priority , it includes the recevier of the data transmission and whole duration (data frame + ACK).  Other nodes receive this RTS will set its NAV(net allocation vector).  Receiver will answer RTS with CTS message after waiting for SIFS.  This CTS will also include duration of transmission
  • 12. DFWMAC-PCF with polling   PCF- Point Coordination Function It requires an access point that controls medium access and polls the single nodes.
  • 13. MAC frames  Frame control – serve several purposes.      Duration/ID – indicating the period of time in which the medium is occupied, used to set the NAV. Address 1 to 4 – four address fields contain standard IEEE 802 MAC addresses (48 bits each), meaning of each address is depend upon the DS bits. Sequence control – seq. no used to filter duplicates.      Protocol version – current protocol version. Type – function of frame : management (00), control (01), or data (10) and value (11) is reserved. Subtype – subtype for management frame: (0000) for association req. , (1000) beacon , RTS (1011), CTS (1100). More fragments – 1 more frag. Present. Retry – if retransmission set to 1. Power Management – set to 1 then power saver mode. More data – indicate more data is present between access point and station nodes.
  • 14. Interpretation of MAC addresses     Ad-hoc network – exchange of MAC frame between two wireless nodes without a distribution system. Infrastructure network(from AP) – frame physically originates from an access point. Infrastructure network (to AP) – station sends a packet to another station via the access point. Infrastructure network (within DS) – packet transmitted between two access points. BSSID – basic service set ID , DA – destination address , SA – source address,RA – receiver address , TA – transmitter address.
  • 15. MAC Management Perform following tasks:    SYN – finding a wireless LAN, SYN of internal clock, generation of becon signals. Power Management – to control, transmitter activity for power management (periodic sleep,buffering, without missing a frame). Roaming – joining a network,changing of access points,scanning for access points. Management information base(MIB) – parameters representing the current state, can be accessed via standardized protocol : simple network management protocol (SNMP).
  • 16. SYN      To SYN clocks of all nodes , timing synchronization function (TSF). Within a BSS, timing is conveyed by the periodic transmissions of a beacon frame. Beacon contains a timestamp and other management information used for power management and roaming. Transmission of a beacon frame is not always periodic as it deferred if the medium is busy. In infra-based network , AP performs SYN by transmitting the periodic beacon signal.
  • 17. SYN example   Beacon intervals are not shifted if one beacon is delayed. Timestamp of beacon always reflects the real transmit time, not the scheduled time.
  • 18. Power Management    Wireless devices are battery powered , i.e power saving mechanisms are crucial. Basic idea of power management is to switch off the transceiver whenever it is not needed. PM is simple for sending device, but PM for receiver can't known is advance.  Receiver “walk up” the transceiver periodically.  Power saving includes two states for a station: Sleep and awake  Buffering of data in sender.
  • 19. Power Management (Cont.)      Sender communicate with power saving station then it has to buffer data. If a station detects that it is a destination of a buffered packet it has to stay awake until the transmission takes place. Walk up at right moment require the timing synchronization function(TSF). Power management in infra-based network is simpler. Beacon sent by the access point, a traffic indicating map(TIM) is transmitted.
  • 20. Power Management example DTIM – delivery traffic indication map
  • 21. Power Management in Ad-hoc Self Study
  • 22. Roaming  Moving between AP is called roaming. Steps are as follows : Check current link quality and scanning for another AP.  Scanning involves the active search for another BSS. – Passive scanning means listening into the medium to find other n/w. i.e receiving beacon msg. – Active scanning means also sending a probe – and , beacon and prob responses used to join the new BSS  Select the best AP and send association request.  New BSS response the association request
  • 23. IEEE 802.11b & 802.11a Self Study
  • 24. HIPERLAN    HIPERLAN – High Performance Local Area Network ETSI (European Telecommunication Standard Institute) standardized HIPERLAN HIPERLAN is a WLAN allowing for node mobility and supporting ad-hoc and infrastructure-based topologies.
  • 25. Bluetooth  In 1998 five companies (Ericsson,Intel,IBM,Nokia,Toshiba) founded the Bluetooth consortium with the goal of developing a single-chip,low-cost,radio-based wireless network technology.
  • 27. Bluetooth Architecture (Networking)     It operate on 79 channels in the 2.4 GHz band with 1 MHz carrier spacing. Each device perform frequency hopping with 1600 hops/s in a random fashion. Piconet – it is a collection of Bluetooth device which are SYN to the same hopping sequence. Piconet is a collection of devices with different roles.
  • 28. Cont.         One device in piconet is master (M) All other device connected to the master are act as a slaves(S). Two additional devices : parket devices (P) and stand-by (SB) P – known but they do not have connection. SB – do not participated in the piconet. M determine the hopping pattern in the piconet Slaves have to SYN to this pattern. Each piconet has one master and exctly 7 simultaneous slaves.
  • 29. Formation of Piconet       As all devices use a same hopping sequence they must be SYN. Step 1 Master sending its clock and device ID . Step 2 hopping pattern is determined by the device ID , a 48bit worldwide unique identifier. Step 3 slaves adjust their internal clock according to the master and participated in the piconet. All active devices are assigned a 3-bit active member address (AMA). All parket devices use an 8-bit parket member address(PMA).
  • 30. Formation of Scatternet    Groups of piconet called scatternet. Many piconet with overlapping coverage can form scatternet. If a device wants to participate in more then one piconet, then it has to SYN to the hopping seq. of the piconet it wants to take part in.
  • 31. Bluetooth (Protocol Stack)  Protocol stack can be divided into two parts    Core specification Profile specification Core specification comprise following elements: Radio  Baseband  Link Manager Protocol   Logical Link Control and adaptation protocol (L2CAP) Service discovery protocol
  • 32. Bluetooth:Protocol Stack:Core:Radio      It specifies the air interface i.e frequencies, modulation and transmit power. Bluetooth uses the license-free frequency band at 2.4 GHz. A frequency hopping/time-division duplex scheme is used for transmission, with a fast hopping rate of 1600 hops/sec. A time interval between two hops is 625 mico sec. Each slot uses different frequency
  • 33. Bluetooth:Protocol Stack:Core:Baseband  It manages frequncy hopping ,medium access and also defines the packet format.  It defines 1-slot, 3-slot and 5 slot for higher data rates.  No frequency hopping is performed within packets.  In above example the master or one out of seven slaves may transmit data in an alternative fashion.
  • 34. Bluetooth:Protocol Stack:Core:Baseband (Cont..)  Components of a bluetooth packet at baseband layer, packet contains following three fields :   Access code– used for timing SYN and piconet identification. Packet header – used for addess, packet type , flow and error control and checksum.The three bit active member address (AMA) represent the active address of the slave. Payload – up to 343 bytes payload can be transferred.
  • 35. Bluetooth:Protocol Stack:Core:Physical Link  It offers two different types of links: Synchronous connection-oriented link(SCO)    For this master reserve two consecutive slots (forward and return slots) at fixed intervals Master can support upto three simultaneous SCO links to the same slave or to different slaves. Asynchronous connectionless link(ACL)   Data applications , point-to-multipoint transfer scenarios Only one ACL links can exist between a master and slave.
  • 36. Bluetooth:Example data transmission    Master always uses the even number of frequency slots , odds slots are for the slaves Every sixth slot is used for an SCO link ACL link use single or multiple slots providing asymmetric bandwith