Chapter 4 - Wireless Local Area Networks
Chapter 4 - Wireless Local Area Networks
3/27/2024
Chapter 4
3/27/2024
Roadmap
3/27/2024
Wireless v/s Wired Networks
Regulations of frequencies
• Limited availability, coordination is required
• Useful frequencies are almost all occupied
Bandwidth and delays
• Low transmission rates
• Few Kbps to some Mbps.
• Higher delays
• Several hundred milliseconds
• Higher loss rates
• Susceptible to interference, e.g., engines, lightning
Always shared medium
• Lower security, simpler active attacking
• Radio interface accessible for everyone
• Fake base stations can attract calls from mobile phones
• Secure access mechanisms important
Difference Between Wired and Wireless
If both A and C sense the channel to be idle at the same time, they send
at the same time.
Collision can be detected at sender in Ethernet.
Half-duplex radios in wireless cannot detect collision at sender.
Introduction to Wireless LANs
Wireless LANs provide a new layer of flexibility & services to
the environments & users that can not be served well by the
traditional wired LAN.
Especially for uses who are becoming highly mobile within their
environments , wireless LANs is most effective way to provide
them with their information & services .
Advantages Advantages
• Simple, cheap, available in many • Experience from wireless WAN and
mobile devices mobile phones can be used
• No licenses needed • Coverage of larger areas possible
• Simple shielding possible (radio can penetrate walls, furniture
etc.)
Disadvantages
• Interference by sunlight, heat sources
Disadvantages
etc. • Very limited license free frequency
bands
• Many things shield or absorb IR light
• Shielding more difficult, interference
• Low bandwidth
with other electrical devices
Example Example
• IrDA (Infrared Data Association)
• Many different products
interface available everywhere
Comparison: Infrastructure vs. Ad-hoc Networks
Sr. No. Infrastructure Networks Ad-hoc Networks
AP Wired Network AP
Ad-hoc network
Comparison: Infrastructure vs. Ad-hoc Networks
Infrastructure
Network
AP wired network AP
Ad-hoc Network
802.11 - Architecture of an Infrastructure Network
802.11 LAN
Direct communication within a limited
range
STA1
IBSS1 STA3 Station (STA):
Terminal with access mechanisms to the
wireless medium
STA2
Independent Basic Service Set
(IBSS):
Group of stations using the same radio
IBSS2
frequency
STA5
Fixed
terminal
Mobile terminal
Infrastructure
network
Access point
application application
TCP TCP
IP IP
LLC LLC LLC
802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC
802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY
802.11 - Layers and Functions
Station Management
LLC
DLC
PLCP
PHY
PHY Management
PMD
802.11 - Physical layer (Classical)
3 versions: 2 layer based on radio transmission and 1 layer based on infra red
FHSS (Frequency Hopping Spread Spectrum)
Spread spectrum technique allowing co-existence of multiple networks in the same area
by separating diff networks using diff hopping sequence
DSSS(Direct sequence spread spectrum)
Spread spectrum method separating by code and not by frequency.
Spreading is achieved using 11-chip Barker sequence(+1,-1,+1,+1,-1,+1,+1,+1,-1,-1,-
1).robust against interference.
Infrared
It uses infrared light with wavelength 850-950 nm to transmit binary data., max range is
10 m .with 1-2 Mbps data rate..
Point-to-multipoint communication , very low coverage area., interference due to
sunlight.
FHSS-PHY Packet Format
Synchronization
• synch with 010101... Pattern , used for synchronization of potential receivers
SFD (Start Frame Delimiter)
• 0000110010111101 start of frame provides frame synchronization
PLW (PLCP_PDU Length Word)
• length of payload incl. 32 bit CRC of payload, PLW < 4096
PSF (PLCP Signaling Field)
• Data rate of payload . all bits set to zero(0000) indicates lowest data rate of 1 Mbit/s.(1111)
indicates maximum i.e. 8.5 Mbit/s.
HEC (Header Error Check)
• PLCP header is protected by 16 bit checksum CRC with x16+x12+x5+1
80 16 12 4 16 variable bits
synchronization SFD PLW PSF HEC payload
Access methods
DFWMAC-DCF CSMA/CA (mandatory)
• Collision avoidance via randomized “back-off“ mechanism
• Minimum distance between consecutive packets
• ACK packet for acknowledgements (not for broadcasts)
DFWMAC-DCF w/ RTS/CTS (optional)
• Distributed Foundation Wireless MAC
• Avoids hidden terminal problem
DFWMAC- PCF (optional)
• Access point polls terminals according to a list
802.11 - MAC layer (Medium Access Control layer)
direct access if t
medium is free DIFS slot time
Station ready to send starts sensing the medium (Carrier Sense based on CCA, (Clear
Channel Assessment))
If the medium is free for the duration greater than DIFS ,the station directly access the
medium.
If the medium is busy, the station has to wait till medium free , once medium free, the
station waits for DIFS and then enter contention phase . each node chooses random back-
off timer (collision avoidance, multiple of slot-time) and does not access the medium till
timer expires
If another station occupies the medium during the back-off time of the station, the back-
off timer stops (fairness).
If a node senses medium is free , even after its timer expires, then node can immediately
access the medium.
802.11 - competing stations - simple version
DIFS DIFS DIFS DIFS
boe bor boe bor boe busy
station1
boe busy
station2
busy
station3
busy medium not idle (frame, ack etc.) boe elapsed backoff time
DIFS
data
sender
SIFS
ACK
receiver
DIFS
other data
stations t
waiting time contention
DFWMAC-DCF with RTS/CTS extension
Sending unicast packets
Station can send RTS with reservation parameter after waiting for DIFS (reservation
determines amount of time the data packet needs the medium)
Acknowledgement via CTS after SIFS by receiver (if ready to receive)
Sender can now send data at once, acknowledgement via ACK
Other stations store medium reservations distributed via RTS and CTS
NAV: Net allocation Vector
DIFS
RTS data
sender
SIFS SIFS
CTS SIFS ACK
receiver
DIFS
RTS frag1 frag2
sender
SIFS SIFS SIFS
CTS SIFS ACK1 SIFS ACK2
receiver
NAV (RTS)
NAV (CTS)
NAV (frag1) DIFS
other NAV (ACK1) data
stations t
contention
DFWMAC-PCF with Polling
t0 t1
SuperFrame
t2 t3 t4
PIFS SIFS
D3 D4 CFend
point
coordinator SIFS
U4
wireless
stations
stations‘ NAV
NAV contention free period contention t
period
802.11 - Frame format
Duration/ID: indicates period of time in which medium is occupied.
Types-function of the frame
◦ control frames(01), management frames(00), data frames(10)
◦ Subtype : management frame is e.g.0000 for association request, RTS is control frame with
subtype 1011
Sequence control
◦ Helps to identify duplicate frames due to lost ACKs
Addresses
◦ 1-receiver, 2-transmitter (physical), 3&4-logical assignment of frames BSS identifier,
(logical) sender & receiver
bytes 2 2 6 6 6 2 6 0-2312 4
Frame Duration/ Address Address Address Sequence Address
Data CRC
Control ID 1 2 3 Control 4
bits 2 2 4 1 1 1 1 1 1 1 1
Protocol To From More Power More
Type Subtype Retry WEP Order
version DS DS Frag Mgmt Data
802.11 - Frame format
More Fragments: this field is set to1 if there is another fragment
attached to the current MSDU.
Retry : If the current frame is retransmission of earlier frame, this bit
is set to 1,hence duplicates can be eliminated.
Power management: mode of the station after successful transmission
of a a frame.
1-station is in power-save mode, 0-station is active.
More data- used to indicate to the receiver that sender has more data
than the current frame.
Wired equivalent privacy(WEP)-This field indicates that standard
security mechanism is applied.
Order- if this bit is 1the received frames must be processed in strict
order
MAC Address Format
scenario to DS from address 1 address 2 address 3 address 4
DS
ad-hoc network 0 0 DA SA BSSID -
infrastructure 0 1 DA BSSID SA -
network, from AP
infrastructure 1 0 BSSID SA DA -
network, to AP
infrastructure 1 1 RA TA DA SA
network, within DS
bytes 2 2 6 6 4
Frame Receiver Transmitter
RTS Duration CRC
Control Address Address
Request To Send
bytes 2 2 6 4
Frame Receiver
CTS Duration CRC
Control Address
Clear To Send
802.11 - MAC management
Synchronization
• Try to stay within a LAN, Synchronization of internal clocks
• Generation of beacon signals
Power management
•Sleep-mode without missing a message
•Frame buffering, traffic measurements
Roaming
•Joining a network
•Roaming, i.e. change networks by changing access points
•Scanning, i.e. active search for a network
MIB - Management Information Base
•All parameters representing current state of wireless station n
access point are stored n managed within a MIB
Synchronization Using a Beacon (Infrastructure)
beacon interval
B B B B
access
point
busy busy busy busy
medium
t
value of the timestamp B beacon frame
Synchronization using a Beacon (ad-hoc)
beacon interval
B1 B1
station1
B2 B2
station2
D B T T d D B
access
point
busy busy busy busy
medium
p d
station
t
T TIM D DTIM awake
B1 A D B1
station1
B2 B2 a d
station2
t
B beacon frame random delay A transmit ATIM D transmit data
higher layers
medium access logical link
network layer
control layer control layer
channel access medium access
data link layer
control layer control layer
physical layer physical layer physical layer
AP AP/CC
control control
control
data
data
MT1 MT2 MT1 MT2 MT1 MT2 +CC
data control
Centralized Direct
HiperLAN2 Protocol Stack
Higher layers
Physical layer
HiperLAN2 Protocol Stack
Physical layer- handles modulation, synchronization, signal
detection, forward error correction.
Data link control layer- contains MAC functions, the RLC
sub layer and error control functions
DLC user part contains error control mechanisms
Radio link control sub layer- Contains
Association control function(ACF)- controls association and
authentication of new MTs as well as synchronization of the
radio cell via beacons.
DLC user connection control- controls connection setup ,
modification, and release.
Radio resource control(RRC)-handles handover between
AP’s and within an AP.
Highest Layers- segmentation and reassembly
Overview: Original HIPERLAN protocol family
HIPERLAN 1 HIPERLAN 2 HIPERLAN 3 HIPERLAN 4
Application wireless LAN access to ATM wireless local point-to-point
fixed networks loop wireless ATM
connections
Frequency 5.1-5.3GHz 17.2-17.3GHz
Topology decentralized ad- cellular, point-to- point-to-point
hoc/infrastructure centralized multipoint
Antenna omni-directional directional
Range 50 m 50-100 m 5000 m 150 m
QoS statistical ATM traffic classes (VBR, CBR, ABR, UBR)
Mobility <10m/s stationary
Interface conventional LAN ATM networks
Data rate 23.5 Mbit/s >20 Mbit/s 155 Mbit/s
Power yes not necessary
conservation
S
P
P
M
M
SB S
M=Master P SB SB
S=Slave
P=Parked S
SB=Standby
Scatternet
User scenarios
b) Bridge to internet
Bluetooth Protocol Architecture
Bluetooth has a layered protocol architecture
• Core protocols
• Cable replacement and telephony control protocols
• Adopted protocols
Core protocols
• Radio
• Baseband
• Link manager protocol (LMP)
• Logical link control and adaptation protocol (L2CAP)
• Service discovery protocol (SDP)
66
Bluetooth Protocol Technology
The following MAC procedures support the asynchronous
connectionless or connection-oriented (ACL) and synchronous
connection-oriented (SCO) link delivery services:
67
Bluetooth Protocol Technology
The Logical Link Control and Adaptation Protocol (L2CAP)
layer, forming an interface to standard data transport protocols.
It handles the multiplexing of higher layer protocols and the
segmentation and reassembly (SAR) of large packets.
The data stream crosses the LM layer, where packet scheduling
on the ACL channel takes place.
The audio stream is directly mapped on an SCO channel and
bypasses the LM layer.
The LM layer, though, is involved in the establishment of the
SCO link.
Bluetooth Protocol Technology
Control messages are exchanged between the LM layer and
the application.
The 2.4 GHz industrial, scientific, and medical (ISM) band
PHY signaling techniques and interface functions that are
controlled by the IEEE 802.15.1-2005 MAC.
Above the L2CAP layer may reside the Serial Cable
Emulation Protocol based on ETSI TS 07.10 (RFCOMM),
Service Discovery Protocol (SDP), Telephone Control
Protocol specification (TCS), voice-quality channels for audio
and telephony, and other network protocols.
These protocols are necessary for interoperability for end-
user products, but are outside the scope of this standard
Bluetooth Protocol Architecture
Protocol Stack
70
Bluetooth Protocol Architecture
Usage Models
71
Usage Models
72
Security
User input (initialization)
PIN (1-16 byte) Pairing PIN (1-16 byte)