4.0 Wireless Local Area Networks
4.0 Wireless Local Area Networks
and
Mobile Computing
1
Wireless Networks
2
Types of Wireless Networks
3
… (cont’d)
What is a standard?
Two main standard families for wireless LANs.
IEEE 802.11(802.11b, 802.11a, 802.11g, ...)
ETSI Hiperlan(Hiperlan Type 1, Hiperlan Type 2, HiperAccess,
HiperLink, …)
802.11 is the most successful and relevant standard
Hiperlan is a European alternative for IEEE 802.11
6
IEEE 802.11
IEEE 802.11 is a set of medium access control (MAC) and physical layer
(PHY) specifications for implementing Wireless Local Area Network
(WLAN) communication.
The standard provides the basis for wireless network products using
the Wi-Fi brand. It is a network access technology for providing
connectivity between wireless stations and wired networking
infrastructures.
8
802.11 standard (some of the versions)
802.11b, 802.11g and 802.11a, versions of the standard are used for
wi-fi networks and also are widely used.
9
IEEE 802.11 (Radio) Evolution
The main difference between the versions of the standard is at the physical
layer. At the MAC layer, all versions of the standard are the same.
10
Summary
There are two standard families that define how WLANs should work.
IEEE 802.11 ← standard by the Amaricans
Hiperlan ← standard by the Europeans
IEEE is the most famous and widely used standard. So, every WLANs devices,
that we use in our daily life, works according to the IEEE 802.11 standard.
The IEEE 802.11 standard is broken into two main layers:
The Media Access Control layer (MAC)
The Physical layer (PHY)
These two layers allow a functional separation of the standard and, more
importantly allows a single data protocol to be used with several different
RF transmission techniques.
The standard has different versions, since 1997. But, versions b, a and g are
the most successful and currently implemented technologies.
11
802.11 Physical(PHY) Layer
The PHY layer of the 802.11 standard defines the different Radio
Transmission(RF) techniques.
Physical medium can be copper wire, fiber optic cable, twisted pair in OSI model
or wireless channel in 802.11.
There are three basic transmission techniques:
Frequency Hopping Spread Spectrum or FHSS
Direct Sequence Spread Spectrum or DSSS, and
Diffuse Infrared
The DSSS is the most popular technique used. This is mainly due to the
higher bandwidth available to the DSSS implementation and the fact
that the DSSS function lends itself better to interoperability between
different implementations.
The DSSS technique operates in channels spread between 2.4 and 2.497
GHz. However, the specific channels available vary by country and the
regulation agencies which controls the spectrum allocation. 12
… cont'd
But, the 'a' standard employs OFDM transmission technique at the
physical layer and as a result allows a very high bit rate (up to 54Mbps)
'b' and 'g' can only use 3 frequency channels that are not overlapping,
in the 2.4GHz frequency spectrum.
'a' has 12 non overlapping frequency channels to use.
Why? If you look at the spectrum, it is true that there are 14 defined channels.
But, only 3 of them(for b & g) that are not overlapping can be selected.
Conclusion: At the physical layer, there are main differences among the
standards:
In the frequency bands that are used
The technique that is used to transmit data
14
Channel Allocation in the Radio Frequency spectrum
ISM Bands:
There are a number of unlicensed spectrum bands in a variety of areas of the
radio spectrum. Often these are referred to as ISM bands - Industrial, Scientific and
Medical, and they carry everything from microwave ovens to radio
communications.
Wi-Fi is aimed at use within unlicensed spectrum. This enables users to access the
radio spectrum without the need for the regulations and restrictions that might
be applicable elsewhere. The downside is that this spectrum is also shared by
many other users and as a result the system has to be resilient to interference.
The main bands used for carrying Wi-Fi are those in the table below:
15
… cont'd
16
… cont'd
17
… cont'd
If there are many BSSs that are near by to each other, it is better the
BSSs work on different frequency channels to avoid interference.
Like in large campuses where you may need to deploy many access
points, the 'b' & 'g' technologies could be a problem. Here comes the
advantage of the 'a' technology over 'b' and 'g' , because it has 12
possible channels.
18
… cont'd
From the diagram above, it can be seen that Wi-Fi channels 1, 6, 11, or 2, 7, 12,
or 3, 8, 13 or 4, 9, 14 (if allowed) or 5, 10 (and possibly 14 if allowed) can be
used together as sets. Often Wi-Fi routers are set to channel 6 as default, and
therefore the set of channels 1, 6 and 11 is possibly the most widely used.
19
… cont'd
20
Network Architecture of 802.11 Standards
Consider the groups of nodes above, assume the BSSs are using 'b'
technology, meaning:
Each node has a 802.11b radio interface that operates in one of the
three possible frequency channels and they are located close by to
each other.
The bunch of nodes form a network.
– they may include an access point – Wireless LAN with access point
– may communicate in an ad hoc mode – Ad Hoc Wireless LAN
22
… cont'd
23
… cont'd
ESS: is a set of two or more wireless APs connected to the same wired
network that defines a single logical network segment bounded by a
router (also known as a subnet).
DS: The APs of multiple BSSs are interconnected by the DS. This allows for
mobility, because STAs can move from one BSS to another BSS. APs can be
interconnected with or without wires; however, most of the time they are
connected with wires. The DS is the logical component used to
interconnect BSSs. The DS provides distribution services to allow for the
roaming of STAs between BSSs. 24
… cont'd
.
25
Node Movement(Networked BSSs)
If there are more than one BSSs in a geographical area, those BSSs will be
interconnected to each other by a cable or through wireless technology. In this
case, we have a wireless network where, the access points are inter-connected by
a distribution system.
If a user moves from one BSS to an other BSS, he/she must stay connected to the
wireless LAN. Because, the different access points(AP) that correspond to the
different BSSs are interconnected to the distribution system.
In the case of BSSs that work in ad hoc mode, the radio interface that is found in
the wireless users that are in the BSS is configured in ad hoc mode. So, nodes can
communicate between each other and when they move to different BSSs, they use
the distribution system in the ad hoc network.
** The fact that the 802.11 nodes communicate based on the infrastructure mode
or ad hoc mode depends on how their wireless card is configured.
26
Joining a BSS
When we have a BSS with access point, the steps that are
performed by the wi-fi card are Scanning, Authentication, and
Association.
When a wireless node wants to connect to BSS which is working in
an ad hoc mode, the only step that it needs is scanning.
The first thing that the card needs to do is to discover other nodes.
27
Joining a BSS(BSS with AP)
Scanning:
The wireless card will listen for possible frequency channels. Example: If
the card is a 'g' card, it will scan the channels working at 2.4GHz in order
to discover an access point operating at 2.4GHz.
How can a wireless card node find an access point? - Active scanning and
passive scanning
Passive Scanning:
Access points periodically(every 100ms) broadcast a massage that is called
“Beacon”.
This beacon includes the “BSS ID”, which uniquely identifies the BSS
A wireless card listens the frequency channel for a given time, waits until
it gets an access point transmitting at the frequency channel in which it is
operating.
If there is an access point, they will record the signal to noise ratio in
order to identify the quality of the signal received.
The node will pass to another channel and repeat the same operation.
28
Joining BSS with AP (… cont'd)
At the end of the scanning operation, you will have a list of all access
points and their signal to noise ratio that tells you how good is the
reception from the access point.
The node has also read the BSS IDs and it will have the identifiers of
each BSS.
Active Scanning:
To speed up the scanning process
A wireless node, instead of listening to the frequency channel to just
wait for a beacon message, it can send “ProbeRequest frame” to all
the channels and wait & see if any one replies to its message.
All APs with in reach will reply with a “ProbeResponse frame”, to
get discovered themselves.
The node will have to select the best access point from the list of
access point that are with in reach.
29
Joining BSS with AP (… cont'd)
Authentication:
Once a wireless node selects AP, it needs to authenticate itself. Why? → not
every body is authorized to use that AP.
In order to operate in that BSS, you have to provide your credentials.
But, there are APs that are open and you don't need to authenticate
yourself with username and password.
So, you find access points to which you can connect without providing
any credentials. Why? → sometimes the access points uses old
communication systems in which, the only thing the access point has
is a list of MAC addresses of wireless nodes. And any user that has a
wireless card with MAC address that is found in the list can connect to
the access point.
30
Joining BSS with AP (… cont'd)
Other access points that are more protected, uses the shared key
authentication. And in that case, you will need username and password.
Your wireless card should share a secret key with the access point and
perform a security procedure in order to authenticate itself.
Assuming that the user has the correct credentials to use the AP
and has authenticated itself to the AP, the user can exchange
packets with the AP. However, before it starts exchanging data an
association step should be performed.
Association:
Once a user is authenticated, it starts the association process, i.e.
information exchange about the AP/station capabilities.
The user sends an “AssociationRequest frame” including information
about itself. The characteristics of the wireless card will be included
in the frame.
Another important information that is going to be included is
whether the user has previously been associated to other access
points.
If “yes”, it has to inform the new BSS that it was previously been
connected to other APs.
32
Joining BSS with AP (… cont'd)
The AP replies to the AssociationRequest frame with
“AssociationResponse frame”, which includes its characteristics.
Example:
– Which types of cards(b,g,a) it can support
– The data rate it can support
– The frequency band it operates on
The new AP will inform the old AP about the user joining to its BSS,
called “hand over process”
Two important aspects of Association:
– Exchanging information about each other's characteristics.
– Notifying the old AP, if the user is on hand over.
33
Joining a BSS (IBSS)
In the case of ad hoc networks, the only step required to join a BSS
is scanning. But, who is sending the beacon message during the
scanning process, since there is no access point which controls the BSS?
Scenarios:
a) In a case where, a BSS is operating in ad hoc mode and all nodes in the BSS are
in radio visibility to each other.
We assume that the first node which switched “ON” its wireless card
is the node which periodically broadcasts the beacon.
Rule: If a node doesn't hear any beacon, after a timeout, it will start
sending the beacon. Other nodes that comes after it will listen to the
channels. They will find that in the frequency channel in which they
want to operate on, there is a node sending a beacon. They will connect
with this node and will compose a BSS in an ad hoc mode.
34
Joining IBSS (… cont'd)
b) In a case where, there are different IBSSs that can't hear to each other(not in a radio
visibility). So, they are separate IBSSs. But, a new wireless node at the middle of the
two IBSSs which is in radio range to both IBSSs(can hear beacons from both IBSSs)
wants to join to an ad hoc network. Which IBSS should it join?
Assuming both IBSSs operate in the same radio frequency channel, the
new node will start operating in that frequency channel that both IBSSs
are operating.
The new node will hear beacons from both IBSSs, but doesn't know which
beacon it should follow.
The standard doesn't have a solution for this problem(though, people can
come up with their own algorithms based on distance and the BSS which
transmits the beacon first … )
MAC Frames:
What kind of packets do nodes exchange with in a BSS? In 802.11, packets
at the MAC layer are called frames.
control frames: e.g. ACK, handshake for accessing the channel(RTS,CTS)
data packets, that carry information
management packets: connection establishment/release, synchronization,
authentication.
Exchanged as data frames, but are not reported to higher layer. e.g Beacons
In the case of data packets, the payload of the packets may vary. We may
have long frames and short frames depending on the payload size.
This means, in a wireless LAN with AP, the AP access the channel in the
same way as the other nodes in the network. There are no differences in
the way the AP transmits data over the channel.
Remark 1:
DCF works based on CSMA/CA ← not CSMA/CD
Why? In wireless Networks, the communication nodes are equipped
with only one transceiver. They can't transmit and receive at the
same time.
39
… cont'd (Time slot)
Remark 2:
In wireless networks, time is divided into time slots and all nodes are
synchronized according to such time distribution.
Time slot is the sum of the following two parameters
– The time interval that allows a node to switch from transmit to
receive mode or vice versa ( TX/RX turnaround time)
– The time interval that allows a node to detect whether there is a
signal in the channel (Power detection time)
40
… cont'd (Time slot)
The internal clock of a node may become inactive for a long time.
So, nodes should get resynchronized continuously.
To let the node continuously be resynchronized, we use the beacon
frame.
If there is an access point, it means that all nodes will be
synchronized with the access point, or they will be synchronized
based on the node that issues the Beacon in an ad hoc mode.
41
… cont'd (Interframe space)
Interframe Space(IFS):
IFS is the time interval between frame transmissions.
DCF is an access scheme that makes use of different time periods,
interframe spaces.
4 types of IFS:
Short IFS (SIFS)
Point coordination IFS (PIFS) > SIFS
Distributed IFS (DIFS) > PIFS
Extended IFS (EIFS) > DIFS
802.11b: SFIS = 10μs
802.11a: SIFS = 16μs
802.11g: SIFS = 10μs
43
… cont'd
44
DCF Access Scheme – The Basic Protocol
Basic Characteristics:
DCF is based on the Carrier Sense Multiple Access/Collision
Avoidance (CSMA/CA) scheme. ← Not CSMA/CD (which is
for Ethernet technology)
Stations that have data to transmit contend for accessing the
channel
A station has to repeat the contention procedure every time it
has a new data frame to transmit.
45
IEEE 802.11 MAC Protocol overview: CSMA/CA
47
IEEE 802.11 MAC Protocol overview: Handshaking
49
CSMA/CA with RTS/CTS – Handshaking
50
DCF: The Basic Access Mode
A node is able to set its NAV counter, when it is able to read the
header of a packet correctly.
If a node can hear a packet at the channel (physical layer), but can
not correctly demodulate the header of the packet, it can't set the
NAV counter.
52
… cont'd
A frame transmission fails and the frame must be retransmitted, or
It has completed the transmission of a packet but still has data to
transmit
56
Backoff Procedure
Channel is busy
Transmission failure
57
Backoff Procedure (collision Avoidance)
Frame Transmission:
60
… cont'd
Backoff Decrease:
While the channel is busy, the backoff counter is frozen
While the channel is idle, the station decrements the backoff value
until
The channel becomes busy or
The backoff counter reaches zero
61
… cont'd
5. Broadcast MAC frames are always transmitted at the basic rate and
never retransmitted in case of failure.
62
Post Backoff
After completing a transmission, a station waits for the ACK and then
performs the backoff procedure, no matter whether it has a new frame
to transmit or not.
In summary, there are only two cases where a station sends a frame after
having sensed the channel as idle for DIFS, without waiting for a backoff
time:
The station has just entered the BSS and the channel is idle, or
Its post-backoff time has already passed and the channel is idle.
63
Backoff Procedure
64