Wireless LAN technologies include WiFi (802.11 standards) and personal wireless networks like Bluetooth. 802.11 defines infrastructure networks with access points connected to wired networks, and ad-hoc networks without infrastructure. Key aspects of 802.11 include CSMA/CA medium access, frame formats, and physical layer standards for radio frequencies (802.11a/b/g/n) and infrared (now obsolete). Wireless networks offer mobility and flexibility compared to wired networks but have lower bandwidth and can be affected by interference.
This document provides an overview of wireless local area networks (WLANs) and various IEEE 802.11 standards. It describes the characteristics and design goals of WLANs. It also compares infrastructure vs. ad-hoc network architectures and examines the physical layer, MAC layer, and management functions of 802.11. Specific standards like 802.11a, 802.11b, and future developments are outlined. The document provides details on aspects like channel selection, data rates, transmission ranges, and security considerations for different 802.11 technologies.
A wireless local area network (WLAN) uses radio frequency technology to transmit and receive data over the air, providing mobility and flexibility as an extension or alternative to wired networks. Key advantages of WLANs include productivity, convenience, lower installation costs and mobility. However, WLANs also have disadvantages such as higher costs for wireless network cards and access points, susceptibility to environmental interference, and lower bandwidth capacity compared to wired networks. Common applications of WLANs include use in corporate, education, medical and temporary settings.
The document provides an overview of the IEEE 802.11 protocol, describing its architecture, layers, and key mechanisms. The standard defines a cellular architecture with basic service sets (BSS) controlled by access points. It covers the MAC and physical layers, defining fragmentation/reassembly and carrier sense multiple access with collision avoidance (CSMA/CA) for medium access. Request to send/clear to send frames are used for virtual carrier sensing to reduce collisions between hidden stations.
This document provides an overview of wireless local area networks (WLANs), including:
- The advantages and disadvantages of WLANs compared to wired networks.
- A comparison of infrared and radio transmission methods.
- A comparison of infrastructure and ad-hoc network architectures.
- An overview of the IEEE 802.11 standard including physical layer specifications and the distributed coordination function (DCF) medium access control protocol.
The document discusses IEEE 802.11 wireless LAN standards. It covers the physical layer specifications of 802.11b using HR/DSSS and 802.11a using OFDM. It also describes the MAC layer functions including CSMA/CA, fragmentation, power management, and quality of service enhancements. Security methods like WEP and 802.1x are summarized. Key concepts discussed are the BSS, ESS network architecture, and differences from Ethernet in medium access.
Provide a full explanation to the below question.1. Summarize the .pdfarihantmobileselepun
油
Provide a full explanation to the below question.
1. Summarize the 802.11 standard and describe the various flavors of the standard, its
architecture and how the standard is contributing to easing of congestion in cellular networks.
Solution
IEEE 802.11 is a standard that defines the physical and MAC layers of Wireless Local Area
Network (WLAN). Under this standard, the Mobile terminals (MTs) can communicate with a
Access Point (AP) in two modes. First mode is the Infrastructure Mode, in which the MTs
communicate with the APs which forward their data to the WLAN. Second mode is the Adhoc
mode, in which the MTs communicate directly with each other without the use of a AP. The
IEEE 802.11 has a very robust Medium Access Control (MAC) mechanism that helps in
alleviating te congestion in the LANs. The inherent working of MAC protocol employed by
802.11 standard is same as that of Carrier Sense Multiple Access/ Collision Aviodance
(CSMA/CA). However, in IEEE 802.11 the protocol is implemented in two different ways. First
way is called as the Distributed Coordination Function based Wireless MAC (DCFWMAC), and
the second way is Point Coordination Function based Wireless MAC (PCFWMAC).
In the DCFWMAC, every node tries to access the medium based on some fixed duration of time
defined in the standard. Normally there are three such time intervals defined based on which a
node attempts to access the channel and transmit its packets. The first interval is the Short Inter
frame Spacing (SIFS). It is the smallest duration of time between two frames and gives the node
higher priority for sending its data. Such a interval is employed only when the node has correctly
sent its data through the channel and the receiver node needs to send a Acknowlegement (ACK)
after waiting for SIFS period of time. The second most priority interval is PCF Inter Frame
Spacing (PIFS) used during Polling mechanism by the AP. Its duration is between SIFS and
DCF Inter frame Spacing (DIFS). The DIFS is the longest time duration and hence of least
priority, in which a AP has to wait between two successive channel accesses for the given
duration. Once the channel is sensed idle, the AP waits for DIFS period of time to transmit data
through the channel. If the channel is sensed busy, then it backs off for a period of time based on
the minimum and maximum value of a contention window. During the back off period, if the
node senses the channel as busy, then it freezes the backoff counter and starts the backoff(with
the remaining time left) once the channel is idle. In this manner, the nodes which have waited
longer get higher priority over others which accessing the channel. Once the node sends the data
after accessing the channel, the receiver waits for SIFS duration of time to finally send the
acknowledgement to the sender. In order to tackle the hidden terminal problem, the DCFWMAC
employs an additional mechanism called as the RTS-CTS mechanism, in which any node that
wants to transmit.
- Wireless LANs use either wired or wireless infrastructure to connect computing devices within a local area. Wireless LANs provide flexibility, portability, mobility and ease of installation compared to wired LANs.
- The IEEE 802.11 standard defines the physical and data link layers for wireless LANs. It addresses issues like power management, security, and bandwidth that are important for wireless networks.
- The MAC layer uses either a contention-based distributed coordination function (DCF) or contention-free point coordination function (PCF). DCF uses CSMA/CA for channel access while PCF uses polling for contention-free access.
This document provides an overview of WiMAX and the IEEE 802.16 standards for broadband wireless access. It describes key aspects of the 802.16 MAC including its reference model, addressing, connection-oriented design, quality of service support, and uplink/downlink frame structures. It also summarizes the MAC convergence and common part sublayers, addressing, management connections, and bandwidth request mechanisms.
These ppt are the part 2 of mobile computing concepts. These ppt defines the following things
Wireless Networking
Wireless LAN Overview: IEEE 802.11
Wireless applications
Data Broadcasting
Bluetooth
TCP over wireless
Mobile IP
WAP: Architecture, protocol stack, application
environment, applications.
Ethernet protocols refer to the family of local-area network (LAN) standards covered by IEEE 802.3. Ethernet networks can operate in either half-duplex or full-duplex mode and support data rates of 10 Mbps, 100 Mbps, 1000 Mbps, and 10 Gbps. The basic elements of an Ethernet system are the physical medium, medium access control rules, and Ethernet frames. Ethernet frames contain fields for source and destination addresses, length/type, data, and error checking.
- IEEE 802.11n was a proposed amendment to the 802.11 wireless networking standard to improve network throughput and performance. It aimed to achieve speeds up to 540 Mbps.
- There were competing proposals for the standard from different industry groups that eventually merged into a single proposal.
- The standard was finalized in 2006 and added new technologies like MIMO and OFDM to existing 802.11 standards to boost speed and range of wireless networks.
- IEEE 802.11n was a proposed amendment to the 802.11 wireless networking standard to improve network throughput and performance. It aimed to achieve speeds up to 540 Mbps.
- There were competing proposals for the standard from different industry groups that eventually merged into a single proposal.
- The standard was finalized in 2006 and added new technologies like MIMO and OFDM to existing 802.11 standards to boost speed and range.
- IEEE 802.11n was a proposed amendment to the 802.11 wireless networking standard to improve network throughput and performance. It aimed to achieve speeds up to 540 Mbps.
- There were competing proposals for the standard from different industry groups that eventually merged into a single proposal.
- The standard was finalized in 2006 and added new technologies like MIMO and OFDM to existing 802.11 standards to significantly increase wireless network speeds and performance.
The document provides information about wireless networks and standards including IEEE 802.11 (Wi-Fi), Bluetooth, and WiMAX. It discusses the goals and architecture of wireless LANs and PANs, as well as standards like IEEE 802.11, Bluetooth, and their protocols. Key topics covered include the IEEE 802.11 standard including physical layer specifications and MAC architecture, Bluetooth architecture and piconet/scatternet topologies, and protocols in the Bluetooth and IEEE 802.11 stacks.
This document provides an overview of wireless LAN and Bluetooth technologies. It describes IEEE 802.11 standards for wireless LAN including the basic service set, extended service set, infrastructure and ad-hoc modes. It covers the physical layers, MAC protocols and services of 802.11. It also summarizes ATM and its extension to wireless networks, issues in the transition, proposed W-ATM architectures, advantages and disadvantages. Finally it defines Bluetooth technology, the protocol stack and unlicensed frequency band used.
This document discusses WiMAX (Worldwide Interoperability for Microwave Access), the IEEE 802.16 wireless broadband standard. It provides an overview of key aspects of WiMAX including the 802.16 reference model, MAC features and services, QoS support, and bandwidth request mechanisms. The MAC supports connection-oriented transmissions, adaptive burst profiles, and flexible QoS with scheduling for various service classes including UGS, rtPS, nrtPS and BE.
WiMAX (Worldwide Interoperability for Microwave Access) uses the IEEE 802.16 standards for broadband wireless access over long distances. It supports both point-to-multipoint and mesh topologies with a connection-oriented MAC layer that provides quality of service. The physical layer uses OFDM, OFDMA, or single carrier modulation and the MAC layer supports various services classes for different types of traffic.
The document discusses wireless local area networks (WLANs) and personal area networks (PANs). It describes the characteristics and fundamentals of WLANs, including their advantages like flexibility and lower costs, and disadvantages such as lower bandwidth and security issues. It provides details on common wireless standards like IEEE 802.11, Bluetooth, and HomeRF. It also compares infrastructure-based and ad-hoc network topologies and summarizes key aspects of the IEEE 802.11 standard including services, physical layers, and frame formats.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
油
1) The document analyzes the quality of service capabilities of the IEEE 802.11e standard through simulation.
2) It simulates four access categories (voice, video, data, background) on the EDCA mechanism and finds that voice and video have higher throughput and lower delay, showing that 802.11e provides service differentiation.
3) A comparison of 802.11e EDCA and legacy DCF shows that while DCF has slightly higher overall throughput, EDCA experiences less variable data dropping due to its prioritized access scheme.
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5, and 60 GHz frequency bands. It provides connectivity through wireless stations organized into basic service sets (BSSs) that together form an extended service set (ESS). Key components include the MAC sublayer, physical layers using technologies like direct sequence spread spectrum (DSSS), and services that enable station mobility and quality of service (QoS).
irst-order differential equations find applications in modeling various phenomena, including growth and decay processes, Newton's law of cooling, electrical circuits, falling body problems, and mixing problems.
Provide a full explanation to the below question.1. Summarize the .pdfarihantmobileselepun
油
Provide a full explanation to the below question.
1. Summarize the 802.11 standard and describe the various flavors of the standard, its
architecture and how the standard is contributing to easing of congestion in cellular networks.
Solution
IEEE 802.11 is a standard that defines the physical and MAC layers of Wireless Local Area
Network (WLAN). Under this standard, the Mobile terminals (MTs) can communicate with a
Access Point (AP) in two modes. First mode is the Infrastructure Mode, in which the MTs
communicate with the APs which forward their data to the WLAN. Second mode is the Adhoc
mode, in which the MTs communicate directly with each other without the use of a AP. The
IEEE 802.11 has a very robust Medium Access Control (MAC) mechanism that helps in
alleviating te congestion in the LANs. The inherent working of MAC protocol employed by
802.11 standard is same as that of Carrier Sense Multiple Access/ Collision Aviodance
(CSMA/CA). However, in IEEE 802.11 the protocol is implemented in two different ways. First
way is called as the Distributed Coordination Function based Wireless MAC (DCFWMAC), and
the second way is Point Coordination Function based Wireless MAC (PCFWMAC).
In the DCFWMAC, every node tries to access the medium based on some fixed duration of time
defined in the standard. Normally there are three such time intervals defined based on which a
node attempts to access the channel and transmit its packets. The first interval is the Short Inter
frame Spacing (SIFS). It is the smallest duration of time between two frames and gives the node
higher priority for sending its data. Such a interval is employed only when the node has correctly
sent its data through the channel and the receiver node needs to send a Acknowlegement (ACK)
after waiting for SIFS period of time. The second most priority interval is PCF Inter Frame
Spacing (PIFS) used during Polling mechanism by the AP. Its duration is between SIFS and
DCF Inter frame Spacing (DIFS). The DIFS is the longest time duration and hence of least
priority, in which a AP has to wait between two successive channel accesses for the given
duration. Once the channel is sensed idle, the AP waits for DIFS period of time to transmit data
through the channel. If the channel is sensed busy, then it backs off for a period of time based on
the minimum and maximum value of a contention window. During the back off period, if the
node senses the channel as busy, then it freezes the backoff counter and starts the backoff(with
the remaining time left) once the channel is idle. In this manner, the nodes which have waited
longer get higher priority over others which accessing the channel. Once the node sends the data
after accessing the channel, the receiver waits for SIFS duration of time to finally send the
acknowledgement to the sender. In order to tackle the hidden terminal problem, the DCFWMAC
employs an additional mechanism called as the RTS-CTS mechanism, in which any node that
wants to transmit.
- Wireless LANs use either wired or wireless infrastructure to connect computing devices within a local area. Wireless LANs provide flexibility, portability, mobility and ease of installation compared to wired LANs.
- The IEEE 802.11 standard defines the physical and data link layers for wireless LANs. It addresses issues like power management, security, and bandwidth that are important for wireless networks.
- The MAC layer uses either a contention-based distributed coordination function (DCF) or contention-free point coordination function (PCF). DCF uses CSMA/CA for channel access while PCF uses polling for contention-free access.
This document provides an overview of WiMAX and the IEEE 802.16 standards for broadband wireless access. It describes key aspects of the 802.16 MAC including its reference model, addressing, connection-oriented design, quality of service support, and uplink/downlink frame structures. It also summarizes the MAC convergence and common part sublayers, addressing, management connections, and bandwidth request mechanisms.
These ppt are the part 2 of mobile computing concepts. These ppt defines the following things
Wireless Networking
Wireless LAN Overview: IEEE 802.11
Wireless applications
Data Broadcasting
Bluetooth
TCP over wireless
Mobile IP
WAP: Architecture, protocol stack, application
environment, applications.
Ethernet protocols refer to the family of local-area network (LAN) standards covered by IEEE 802.3. Ethernet networks can operate in either half-duplex or full-duplex mode and support data rates of 10 Mbps, 100 Mbps, 1000 Mbps, and 10 Gbps. The basic elements of an Ethernet system are the physical medium, medium access control rules, and Ethernet frames. Ethernet frames contain fields for source and destination addresses, length/type, data, and error checking.
- IEEE 802.11n was a proposed amendment to the 802.11 wireless networking standard to improve network throughput and performance. It aimed to achieve speeds up to 540 Mbps.
- There were competing proposals for the standard from different industry groups that eventually merged into a single proposal.
- The standard was finalized in 2006 and added new technologies like MIMO and OFDM to existing 802.11 standards to boost speed and range of wireless networks.
- IEEE 802.11n was a proposed amendment to the 802.11 wireless networking standard to improve network throughput and performance. It aimed to achieve speeds up to 540 Mbps.
- There were competing proposals for the standard from different industry groups that eventually merged into a single proposal.
- The standard was finalized in 2006 and added new technologies like MIMO and OFDM to existing 802.11 standards to boost speed and range.
- IEEE 802.11n was a proposed amendment to the 802.11 wireless networking standard to improve network throughput and performance. It aimed to achieve speeds up to 540 Mbps.
- There were competing proposals for the standard from different industry groups that eventually merged into a single proposal.
- The standard was finalized in 2006 and added new technologies like MIMO and OFDM to existing 802.11 standards to significantly increase wireless network speeds and performance.
The document provides information about wireless networks and standards including IEEE 802.11 (Wi-Fi), Bluetooth, and WiMAX. It discusses the goals and architecture of wireless LANs and PANs, as well as standards like IEEE 802.11, Bluetooth, and their protocols. Key topics covered include the IEEE 802.11 standard including physical layer specifications and MAC architecture, Bluetooth architecture and piconet/scatternet topologies, and protocols in the Bluetooth and IEEE 802.11 stacks.
This document provides an overview of wireless LAN and Bluetooth technologies. It describes IEEE 802.11 standards for wireless LAN including the basic service set, extended service set, infrastructure and ad-hoc modes. It covers the physical layers, MAC protocols and services of 802.11. It also summarizes ATM and its extension to wireless networks, issues in the transition, proposed W-ATM architectures, advantages and disadvantages. Finally it defines Bluetooth technology, the protocol stack and unlicensed frequency band used.
This document discusses WiMAX (Worldwide Interoperability for Microwave Access), the IEEE 802.16 wireless broadband standard. It provides an overview of key aspects of WiMAX including the 802.16 reference model, MAC features and services, QoS support, and bandwidth request mechanisms. The MAC supports connection-oriented transmissions, adaptive burst profiles, and flexible QoS with scheduling for various service classes including UGS, rtPS, nrtPS and BE.
WiMAX (Worldwide Interoperability for Microwave Access) uses the IEEE 802.16 standards for broadband wireless access over long distances. It supports both point-to-multipoint and mesh topologies with a connection-oriented MAC layer that provides quality of service. The physical layer uses OFDM, OFDMA, or single carrier modulation and the MAC layer supports various services classes for different types of traffic.
The document discusses wireless local area networks (WLANs) and personal area networks (PANs). It describes the characteristics and fundamentals of WLANs, including their advantages like flexibility and lower costs, and disadvantages such as lower bandwidth and security issues. It provides details on common wireless standards like IEEE 802.11, Bluetooth, and HomeRF. It also compares infrastructure-based and ad-hoc network topologies and summarizes key aspects of the IEEE 802.11 standard including services, physical layers, and frame formats.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
油
1) The document analyzes the quality of service capabilities of the IEEE 802.11e standard through simulation.
2) It simulates four access categories (voice, video, data, background) on the EDCA mechanism and finds that voice and video have higher throughput and lower delay, showing that 802.11e provides service differentiation.
3) A comparison of 802.11e EDCA and legacy DCF shows that while DCF has slightly higher overall throughput, EDCA experiences less variable data dropping due to its prioritized access scheme.
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5, and 60 GHz frequency bands. It provides connectivity through wireless stations organized into basic service sets (BSSs) that together form an extended service set (ESS). Key components include the MAC sublayer, physical layers using technologies like direct sequence spread spectrum (DSSS), and services that enable station mobility and quality of service (QoS).
irst-order differential equations find applications in modeling various phenomena, including growth and decay processes, Newton's law of cooling, electrical circuits, falling body problems, and mixing problems.
PROJECT REPORT ON PASTA MACHINE - KP AUTOMATIONS - PASTA MAKING MACHINE PROJE...yadavchandan322
油
All the materials and content contained in Project report is for educational purpose and reflect the views of the industry which are drawn from various research on pasta machine. PM FME- Detailed Project Report of Multigrain Pasta Making Unit. 3. 1. PROJECT ... A pasta extruder is a machine that makes pasta dough through dies to.The process is quite simple and requires not much skilled labour. The machine itself is high technology and provides the manufacturers to produce noodles with. In this article, you will be able to get all the detail about a pasta-making business unit in India and the financial status of this business as well.ENGINEERS INDIA RESEARCH INSTITUTE - Service Provider of Project Report on PASTA PRODUCTION PLANT (SHORT PASTA) [CODE NO. 1632] based in Delhi, India.
Macaroni Machines are used to produce pasta from the raw material. With ... The views expressed in this Project Report are advisory in nature. SAMADHAN.
Distributed System Models and Enabling Technologies: Scalable Computing Over the
Internet, Technologies for Network Based Systems, System Models for Distributed and
Cloud Computing, Software Environments for Distributed Systems and Clouds,
Performance, Security and Energy Efficiency.
Production Planning & Control and Inventory Management.pptxVirajPasare
油
Production Planning and Control : Importance, Objectives and Functions . Inventory Management - Meaning, Types , Objectives, Selective Inventory Control : ABC Analysis
Barbara Bianco
Project Manager and Project Architect, with extensive experience in managing and developing complex projects from concept to completion. Since September 2023, she has been working as a Project Manager at MAB Arquitectura, overseeing all project phases, from concept design to construction, with a strong focus on artistic direction and interdisciplinary coordination.
Previously, she worked at Progetto CMR for eight years (2015-2023), taking on roles of increasing responsibility: initially as a Project Architect, and later as Head of Research & Development and Competition Area (2020-2023).
She graduated in Architecture from the University of Genoa and obtained a Level II Masters in Digital Architecture and Integrated Design from the INArch Institute in Rome, earning the MAD Award. In 2009, she won First Prize at Urban Promo Giovani with the project "From Urbanity to Humanity", a redevelopment plan for the Maddalena district of Genoa focused on the visual and perceptive rediscovery of the city.
Experience & Projects
Barbara has developed projects for major clients across various sectors (banking, insurance, real estate, corporate), overseeing both the technical and aesthetic aspects while coordinating multidisciplinary teams. Notable projects include:
The Sign Business District for Covivio, Milan
New L'Or辿al Headquarters in Milan, Romolo area
Redevelopment of Via C. Colombo in Rome for Prelios, now the PWC headquarters
Interior design for Spark One & Spark Two, two office buildings in the Santa Giulia district, Milan (Spark One: 53,000 m族) for In.Town-Lendlease
She has also worked on international projects such as:
International Specialized Hospital of Uganda (ISHU) Kampala
Palazzo Milano, a residential building in Taiwan for Chonghong Construction
Chua Lang Street Building, a hotel in Hanoi
Manjiangwan Masterplan, a resort in China
Key Skills
鏝 Integrated design: managing and developing projects from concept to completion
鏝 Artistic direction: ensuring aesthetic quality and design consistency
鏝 Project management: coordinating clients, designers, and multidisciplinary consultants
鏝 Software proficiency: AutoCAD, Photoshop, InDesign, Office Suite
鏝 Languages: Advanced English, Basic French
鏝 Leadership & problem-solving: ability to lead teams and manage complex processes in dynamic environments
Mix Design of M40 Concrete & Application of NDT.pptxnarayan311979
油
This presentation briefs the audience about how to carry out design mix of M40 concrete, what are the cares one need to take while doing trials. Second part of presentation deals with various NDT test and its applications in evaluating quality of concrete of existing structures.
"Introduction to VLSI Design: Concepts and Applications"GtxDriver
油
This document offers a detailed exploration of VLSI (Very Large-Scale Integration) design principles, techniques, and applications. Topics include transistor-level design, digital circuit integration, and optimization strategies for modern electronics. Ideal for students, researchers, and professionals seeking a comprehensive guide to VLSI technology.
Virtual Power plants-Cleantech-RevolutionAshoka Saket
油
VPPs are virtual aggregations of distributed energy resources, such as energy storage, solar panels, and wind turbines, that can be controlled and optimized in real-time to provide grid services.
Industry 4.0: Transforming Modern Manufacturing and BeyondGtxDriver
油
This document explores the fundamental concepts, technologies, and applications of Industry 4.0. Topics include automation, IoT (Internet of Things), smart factories, cyber-physical systems, and the integration of AI and big data analytics in industrial processes. It serves as a comprehensive resource for students, professionals, and enthusiasts eager to delve into the fourth industrial revolution.
2. Mobile Communication Technology
according to IEEE (examples)
Local wireless networks
WLAN 802.11
802.11a
802.11b
802.11i/e//n//z/az
802.11g
WiFi
802.11h
Personal wireless nw
WPAN 802.15
802.15.4
802.15.1
802.15.2
Bluetooth
802.15.4a/b/c/d/e/f/gq/r/s
ZigBee
802.15.3
Wireless distribution networks
WMAN 802.16 (Broadband Wireless Access)
[hist.: 802.20 (Mobile Broadband Wireless Access)]
802.16e (addition to .16 for mobile devices)
+ Mobility
WiMAX
802.15.3b/ce
802.15.5, .6 (WBAN),
3. Characteristics of wireless LANs
Advantages
very flexible within the reception area
ad-hoc networks without previous planning possible
(almost) no wiring difficulties (e.g. historic buildings,
firewalls)
more robust against disasters like, e.g., earthquakes, fires
- or users pulling a plug...
One time investment, cost effective
4. Characteristics of wireless LANs
Disadvantages
typically low bandwidth compared to wired networks (1-10
Mbit/s) due to shared medium, lots of interference
different/proprietary solutions, especially for higher bit-
rates or low-power, standards take their time (e.g. IEEE
802.11n, ac), devices have to fall back to older/standard
solutions
products have to follow many national restrictions if
working wireless, it takes a very long time to establish
global solutions like, e.g., IMT-2000
5. Design goals for wireless LANs
global, seamless operation
low power for battery use
no special permissions or licenses needed to use the
LAN
robust transmission technology
simplified spontaneous cooperation at meetings
easy to use for everyone, simple management
protection of investment in wired networks
security (no one should be able to read my data), privacy
(no one should be able to collect user profiles), safety
(low radiation)
transparency concerning applications and higher layer
protocols, but also location awareness if necessary
7. Comparison: infrastructure vs. ad-hoc vs.
mesh networks
infrastructure
network
ad-hoc network
AP
AP
AP
wired network
AP: Access Point
mesh network
8. 802.11 Classical architecture of an
infrastructure network
Station (STA)
terminal with access
mechanisms to the wireless
medium and radio contact to
the access point
Basic Service Set (BSS)
group of stations using the
same radio frequency
Access Point
station integrated into the
wireless LAN and the
distribution system
Distribution System
Portal
802.x LAN
Access
Point
802.11 LAN
BSS2
802.11 LAN
BSS1
Access
Point
STA1
STA2
STA3
ESS
9. 802.11 Classical architecture of an
infrastructure network
Portal
bridge to other (wired)
networks
Distribution System
interconnection network to
form one logical network
(EES: Extended Service Set)
based on several BSS
Distribution System
Portal
802.x LAN
Access
Point
802.11 LAN
BSS2
802.11 LAN
BSS1
Access
Point
STA1
STA2
STA3
ESS
10. 802.11 - Architecture of an ad-hoc network
Direct communication within a limited range
Station (STA):
terminal with access mechanisms to the wireless
medium
Independent Basic Service Set (IBSS):
group of stations using the same radio frequency
802.11 LAN
IBSS2
802.11 LAN
IBSS1
STA1
STA4
STA5
STA2
STA3
11. IEEE standard 802.11
mobile terminal
access point
fixed
terminal
infrastructure
network
LLC- Logical Link Control
12. 802.11 - Layers and functions
MAC
access mechanisms,
fragmentation, encryption
MAC Management
synchronization, roaming,
MIB, power management
PLCP (Physical Layer
Convergence Protocol)
clear channel assessment
signal (carrier sense)
PMD (Physical Medium
Dependent)
modulation, coding
PHY Management
channel selection, MIB
Station Management
coordination of all
management functions
PMD
PLCP
MAC
LLC
MAC
Management
PHY
Management
PHY
DLC
Station
Management
DLC: Data Link Control
MIB: Management Information Base
13. 802.11 - Physical layer (historical)
3 versions: 2 radio (typ. 2.4 GHz), 1 IR
data rates 1 or 2 Mbit/s
FHSS (Frequency Hopping Spread Spectrum)
obsolete
DSSS (Direct Sequence Spread Spectrum)
Infrared - obsolete
14. FHSS PHY packet format
Frequency hopping spread spectrum (FHSS) is a
spread spectrum technique which allows for the
coexistence of multiple networks in the same area by
separating different networks using different hopping
sequences.
The frame consists of two basic parts, the PLCP part
(preamble and header) and the pay-load part.
While the PLCP part is always transmitted at 1 Mbit/s,
payload, i.e. MAC data, can use 1 or 2 Mbit/s.
15. FHSS PHY packet format
Synchronization: The PLCP preamble starts with 80
bit synchronization, which is a 010101... bit pattern.
This pattern is used for synchronization of clock of
potential receivers.
Start frame delimiter (SFD):The following 16 bits
indicate the start of the frame and provide frame
synchronization. The SFD pattern is
0000110010111101.
16. FHSS PHY packet format
PLCP_PDU length word (PLW):This first field of the
PLCP header indicates the length of the payload. PLW
can range between 0 and 4,095.
PLCP signalling field (PSF):This 4 bit field indicates the
data rate of the payload following. All bits set to zero
(0000) indicates the lowest data rate of 1 Mbit/s. The
granularity is 500 kbit/s, thus 2 Mbit/s is indicated by
0010 and the maximum is 8.5 Mbit/s (1111). This system
obviously does not accommodate todays higher data
rates.
17. FHSS PHY packet format
Header error check (HEC): Finally, the PLCP header
is protected by a 16 bit checksum with the standard
ITU-T generator polynomial.
18. DSSS PHY packet format
Direct sequence spread spectrum (DSSS) is the
alternative spread spectrum method separating by
code and not by frequency.
The frame consists of two basic parts, the PLCP part
(preamble and header) and the payload part.
While the PLCP part is always transmitted at 1 Mbit/s,
payload, i.e., MAC data, can use 1 or 2 Mbit/s.
19. DSSS PHY packet format
Synchronization: The first 128 bits are not only used
for synchronization, frequency offset compensation.
The synchronization field only consists of alternative
0s and 1s.
Start frame delimiter (SFD):This 16 bit field is used
for synchronization at the beginning of a frame and
consists of the pattern 1111001110100000.
20. DSSS PHY packet format
Signal: Originally, only two values have been defined
for this field to indicate the data rate of the payload.
The value 0x0A indicates 1 Mbit/s, 0x14 indicates 2
Mbit/s, 0x6E (i.e. 01101110) indicates 11Mbits/s.
How to get this value?
Service: This field is reserved for future use;
however, 0x00 indicates an IEEE 802.11 compliant
frame.
21. DSSS PHY packet format
Length: 16 bits are used in this case for length
indication of the payload in microseconds.
Header error check (HEC): Signal, service, and
length fields are protected by this checksum using
the ITU-T CRC-16 standard polynomial.
22. 802.11 - MAC layer architecture
The MAC layer has to fulfill several tasks.
It has to control medium access,
It can offer support for roaming, authentication, and power
conservation.
Three basic access mechanisms
1. Basic method - based on a version of CSMA/CA,
2. Optional method avoiding the hidden terminal problem,
3. a contention-free polling method for time-bounded service.
The first two methods are also summarized as
distributed coordination function (DCF), the third
method is called point coordination function (PCF).
The MAC mechanisms are also called distributed
foundation wireless medium access control
(DFWMAC).
24. 802.11 - CSMA/CA access method
If station wants to send
starts sensing the medium (Carrier Sense based on CCA,
Clear Channel Assessment)
If the medium is free for the duration of an Inter-
Frame Space (IFS), the station can start sending
(IFS depends on service type)
25. 802.11 - CSMA/CA access method
If the medium is busy, the station has to wait for a
free IFS, then the station must additionally wait a
random back-off time (collision avoidance, multiple
of slot-time)
if another station occupies the medium during the
back-off time of the station, the back-off timer stops
(fairness)
27. 802.11 CSMA/CA Unicast
Station has to wait for DIFS before sending data
Receivers acknowledge at once (after waiting for
SIFS) if the packet was received correctly (FCS)
Automatic retransmission of data packets in case of
transmission errors, but exponential increase of
contention window
t
SIFS
DIFS
data
ACK
waiting time
other
stations
receiver
sender
data
DIFS
contention
28. 802.11 DCF with RTS/CTS
Station can send RTS with reservation parameter
after waiting for DIFS (reservation determines
amount of time the data packet needs the medium)
acknowledgement via CTS after SIFS by receiver (if
ready to receive)
29. 802.11 DCF with RTS/CTS
sender can now send data at once,
acknowledgement via ACK
other stations store medium reservations distributed
via RTS and CTS
30. Fragmentation
Fragmentation is used in case the size of the packets sent has
to be reduced (e.g., to diminish the probability of erroneous
frames).
Each fragi (except the last one) also contains a duration (as
RTS does), which determines the duration of the NAV.
By this mechanism, fragments are sent in a row.
In this example, there are only 2 fragments.
31. 802.11 MAC Frame format
Types: control frames, management frames, data
frames
Sequence numbers: important against duplicated
frames due to lost ACKs
Addresses: receiver, transmitter (physical), BSS
identifier, sender (logical)
Miscellaneous: sending time, checksum, frame
control, data
Only the first
three and the
last field are
present in all
frames!
802.11ac allows
for a variable
frame body
32. Special Frames: ACK, RTS, CTS
Acknowledgement
Request To Send
Clear To Send
Frame
Control
Duration
Receiver
Address
Transmitter
Address
FCS
2 2 6 6 4
bytes
Frame
Control
Duration
Receiver
Address
FCS
2 2 6 4
bytes
Frame
Control
Duration
Receiver
Address
FCS
2 2 6 4
bytes
ACK
RTS
CTS
33. Bluetooth
Basic idea
local area networks with a very limited coverage and
without the need for an infrastructure.
Interconnecting computer and peripherals, handheld
devices, PDAs, cell phones
Embedded in other devices
Data transfer at a speed of about 720 Kbps within 50
meters (150 feet) of range or beyond through walls,
clothing and even luggage bags.
34. Bluetooth Protocol - Overview
Uses the master and slave relationship
Master and slaves together form a Piconet when
master allows slaves to talk
Up to seven slave devices can be set to
communicate with a master in a Piconet Why?
Scatternet is formed when several of piconets are
linked together to form a larger network in an ad hoc
manner.
Bluetooth operates on 79 channels in the 2.4 GHz
band with 1 MHz carrier spacing.
2.402 GHz to 2.480 GHz
35. Piconet
Collection of devices
connected in an ad hoc
fashion.
One unit acts as master and
the others as slaves for the
lifetime of the piconet.
Master determines hopping
pattern, slaves have to
synchronize.
Each piconet has one
master and up to 7
simultaneous slaves (> 200
could be parked)
36. Forming a piconet
All devices in a piconet hop together
Master gives slaves its clock and device ID
Hopping pattern: determined by device ID (48 bit, unique
worldwide)
Phase in hopping pattern determined by clock
Addressing
Active Member Address (AMA, 3 bit)
Parked Member Address (PMA, 8 bit)
37. Scatternet
Linking of multiple co-located piconets through the
sharing of common master or slave devices
Devices can be slave in one piconet and master of
another
M=Master
S=Slave
P=Parked
SB=Standby
M
S
P
SB
S
S
P
P
SB
M
S
S
P
SB
Piconets
38. Bluetooth protocol stack
Physical Radio Layer
The radio layer moves the bits from master to slave, or
vice versa.
It deals with Specification of the air interface, i.e.,
frequencies, modulation, and transmit power
39. Bluetooth protocol stack
Physical Radio Layer, cont
Bluetooth uses the license-free frequency band at
2.4 GHz allowing for worldwide operation with some
minor adaptations to national restrictions.
Bluetooth operates on 79 channels in the 2.4 GHz
band with 1 MHz carrier spacing.
2.402 GHz to 2.480 GHz
Bluetooth transceivers use Gaussian FSK for
modulation.
40. Bluetooth protocol stack
Physical Radio Layer, cont
Three Power Classes
Power class 1: Maximum power is 100 mW and minimum
is 1 mW (typ.100 m range without obstacles).
Power class 2:Maximum power is 2.5 mW, nominal power
is 1 mW, and minimum power is 0.25 mW (typ. 10 m
range without obstacles).
Power class 3:Maximum power is 1 mW.
41. Bluetooth protocol stack
Baseband Layer
The baseband layer is somewhat analogous to the
MAC sublayer but also includes elements of the
physical layer.
It deals with how the master controls time slots and
how these slots are grouped into frames.
42. Bluetooth protocol stack
Baseband Layer, cont
Description of basic connection establishment,
packet formats, timing, and basic QoS parameters.
The master in each piconet defines a series of 625
袖sec time slots,
The master's transmissions starting in the even slots, and
The slaves' transmissions starting in the odd ones.
This is traditional time division multiplexing, with the
master getting half the slots and the slaves sharing the
other half.
Frames can be 1, 3, or 5 slots long.
43. Bluetooth protocol stack
Baseband Layer, cont
Each frame is transmitted over a logical channel,
called a Link, between the master and a slave.
ACL (Asynchronous Connection-Less) Link
Used for packet-switched data available at irregular
intervals. These data come from the L2CAP layer (upper
layer) on the sending side and are delivered to the L2CAP
layer on the receiving side.
ACL traffic is delivered on a best-efforts basis.
No guarantees are given. Frames can be lost and may
have to be retransmitted.
A slave may have only one ACL link to its master.
44. Bluetooth protocol stack
Baseband Layer, cont
Each frame is transmitted over a logical channel,
called a Link, between the master and a slave.
SCO (Synchronous Connection Oriented) Link
This type of channel is allocated a fixed slot in each
direction.
Due to the time-critical nature of SCO links, frames sent
over them are never retransmitted.
Forward error correction can be used to provide high
reliability.
A slave may have up to three SCO links with its master.
45. Bluetooth protocol stack
Link Manager
The link manager handles the establishment of
logical channels between devices, including
power management, authentication, and quality
of service.
47. Bluetooth protocol stack
L2CAP
The logical link control and adaptation protocol
(L2CAP) is a data link control protocol on top of
the baseband layer offering logical channels
between Bluetooth devices.
Three different types of logical channels that are
transported via the ACL between master and
slave:
Connectionless
Connection Oriented
Signaling
48. References
J. Schiller, Mobile Communications, 2nd Edition,
Pearson, 2009.
Chapter 2: Sec 2.5, 2.8,
Chapter 7 Introduction, Sec 7.1 7.3.4.2 , 7.3.4.4, 7.5.
(topics from Sec 7.5 are only those that covered in
lectures)
Andrew S. Tanenbaum, Computer Networks, Fourth
Edition, Sec 4.6.