0% found this document useful (0 votes)
574 views100 pages

EC8004-Wireless Networks-Notes

This document provides an overview of wireless networks and wireless local area networks (WLANs). It discusses the benefits and difficulties of wireless communication and describes the electromagnetic spectrum used for wireless transmission. It also explains wireless transmission technologies including infrared and radio frequency, and spread spectrum systems like frequency hopping spread spectrum and direct sequence spread spectrum. The document focuses on IEEE 802.11 WLAN standards, describing the network architecture, services, protocol layers, and physical layer technologies like frequency hopping spread spectrum physical layer.

Uploaded by

GtecEce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
574 views100 pages

EC8004-Wireless Networks-Notes

This document provides an overview of wireless networks and wireless local area networks (WLANs). It discusses the benefits and difficulties of wireless communication and describes the electromagnetic spectrum used for wireless transmission. It also explains wireless transmission technologies including infrared and radio frequency, and spread spectrum systems like frequency hopping spread spectrum and direct sequence spread spectrum. The document focuses on IEEE 802.11 WLAN standards, describing the network architecture, services, protocol layers, and physical layer technologies like frequency hopping spread spectrum physical layer.

Uploaded by

GtecEce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 100

EC 8004-WIRELESS

NETWORKS
1)Jochen Schiller, ”Mobile Communications”,
Second Edition, Pearson Education 2012.(Unit
I,II,III)
2)Vijay Garg , “Wireless Communications and networking”,
First Edition, Elsevier 2007.(Unit IV,V)
UNIT I - WIRELESS LAN
Introduction-WLAN technologies: - IEEE802.11: System
architecture, protocol architecture, 802.11b, 802.11a – Hiper
LAN: WATM, BRAN, HiperLAN2 – Bluetooth: Architecture, WPAN
– IEEE 802.15.4, Wireless USB, Zigbee, 6LoWPAN,
WirelessHART
Why
• Benefits
Wireless?
– Mobility Ability to communicate anywhere!!
– Easier configuration, set up and lower installation cost
– Easier to maintain.
– Solution in areas where cables are impossible to install
(e.g. hazardous areas, long distances etc.)
Difficulties
– Communication medium: Free space
• Noisy and unpredictable channel
• Broadcast channel, more user
->less BW per user
– Equipment cost is high
– limited BW
– Wireless comm. is influenced by physical obstructions, climatic
conditions, interference from other wireless devices
The Electromagnetic Spectrum
The Electromagnetic Spectrum
Extremely Low Frequencies 30–300 Hz.
(ELF) Power transmission

Voice Frequencies (VF) 300Hz–3KHz.


Audio applications
Very Low Frequencies (VLF) 3KHz-30KHz
Navy,Military applications

Low Frequencies (LF) 30KHz–300 KHz.


Aeronautical,Marine
Medium Frequencies (MF) 300–3MHz
AM radio broadcasting AM radio 535–
1605 kHz.
The Electromagnetic Spectrum
High Frequencies (HF) 3–30 MHz
(short waves; BBC broadcasts;
government and military two-way
communication; amateur radio,
CB.

Very High Frequencies (VHF) 30–300 MHz


FM radio broadcasting (88–108
MHz), television channels 2–13.

Ultra High Frequencies (UHF) 300–3GHz


TV channels 14–67, cellular
phones, military communication.
The Electromagnetic Spectrum

Microwaves and Super High 1–30 GHz


Frequencies (SHF)
Satellite communication, radar,
wireless LANs, microwave ovens

Extremely High Frequencies 30–300 GHz


(EHF)
Satellite communication,
computer data, radar
The Electromagnetic Spectrum

Optical Spectrum
– pThtiecaol exists directly above the millimeter
spectrum
– wave
Threeregion.
types of light waves are:
• Infrared
• Visible spectrum
• Ultraviolet
WIRELESS TRANSMISSION-Introduction
• Provide excellent high speed and reliable data communications in building
or campus environment.
• Wireless devices transmit using one of the following signals such as IR
and RF.
1. INFRARED Txlight based Txn using 900nm wavelength.
It use LASER as a Txr and photodiode as a Rxr.
Requires direct LOS for good Tx
cannot penetrate through walls
No electrical interferences occurs
Requires low BW,no need for license
2.UHF Narrowband TxIt support both unlicensed band(430-450MHz) and
licensed (450-470MHz)
power level is about 2W
Comparison: infrared vs. radio Tx
Infrared Radio
□uses IR diodes, diffuse light, □ typically
using the license free
multiple reflections (walls, ISM band at 2.4 GHz
furniture etc.) Advantages
Advantages □ experience from wireless WAN
□simple,
cheap, available in and mobile phones can be used
many mobile devices □ coverage of larger areas
□ no licenses needed possible (radio can
□ simple shielding possible penetrate walls, furniture
etc.)
Disadvantages
Disadvantages
□interference by sunlight, heat
bands □ limited license free
□ many things shield or absorb □ frequency sources
shielding more etc.
difficult,
IR electrical interference
light Example
□ low bandwidth □ Many different products
Example
□ IrDA (Infrared Data
Association) interface available
everywhere
Spread Spectrum Systems
• Spread spectrum techniques spread information over a very large bandwidth
– specifically, a bandwidth that is much larger than the inverse of the data
rate.
• Different users can be spread across the spectrum in different ways.
• This allows multiple users to transmit in the same frequency
band simultaneously..
• The receiver can determine which part of the total contribution comes from
a specific user by looking only at signals with a specific spreading pattern.
Types
• FREQUENCY HOPPING SPREAD SPECTRUM(FHSS)
• DIRECT SEQUENCE-SPREAD SPECTRUM(DSSS)
IEEE 802.11-WLAN
• Connect single MS to public landline system..
• Connect fixed-location computers to internet.
• Very flexible within reception area
• Ad-hoc networks do not need planning
• No wiring difficulties (e.g. historic buildings, firewalls)
• More robust against disasters like, e.g., earthquakes,
fire
• Coverage area upto 100m.
• Data rate from 700kbps-55Mbps
• Operating Frequency 2.4-2.5GHz
Classifications
1. Infrastructure network
2. Ad-hoc network
Comparison: infrastructure vs. ad-hoc networks

infrastructure network
AP: Access Point AP

AP wired network AP

ad-hoc network
802.11 - Architecture of an infrastructure network

Station (STA)
802.11 LAN
802.x LAN  terminal with access mechanisms
to the wireless medium and radio
contact to the access point
STA1 Basic Service Set (BSS)
BSS1
 group of stations using
Access Portal radio frequency the same
Point Access Point
Distrib  station integrated into the wireless
ution LAN and the distribution system
Access
Syste
ESS Point Portal
m
 bridge to other (wired) networks
BSS2 Distribution System
 interconnection network to form
one logical network (ESS:
Extended Service Set) based
STA2 802.11 LAN STA3 on several BSS
• Basic Service Set (BSS) consists of some number of stations
executing the same MAC protocol and competing for access
to the same shared wireless medium.
• A BSS may be isolated or it may connect to a
backbone distribution system (DS) through an access point
• (AP)
The AP functions as a bridge and a relay point

• In a BSS, client stations do not communicate directly with


one another.
• If one station in the BSS wants to communicate with another
station in the same BSS, the MAC frame is first sent from
originating station to the AP, and then from the AP to
the
destination station.

• A MAC frame from a station in the BSS to a remote station is


sent from the local station to the AP and then relayed by the
AP over the DS on its way to the destination station
• An Extended service set (ESS) consists of two or more basic
service sets(BSS) interconnected by a distribution system.
• Typically, the distribution system is a wired backbone LAN but
can be any communications network
WLAN Services
IEEE 802.11 –Protocol/Layered Architecture

mobile terminal
IEEE 802.11LAYERS

1) PHY or Physical LayerEncoding –decoding , modulation-demodulation.

MAC layer
2) MAC Sub LayerFragmentation and reassembly of packets

3) MAC Management Sub LayerRoaming,power management,Registration and

connection management.
1) Physical layer is further subdivided into sub layers

1)PLCP Carrier sensing and


convert data-frame and carry mgt
information.

2)PMD define modulation and


coding techniques for signaling.
Physical media for WLANs

1) FHSS PHY (Frequency-hopping spread spectrum)


2) DSSS PHY (Direct sequence spread spectrum)
3) Diffused infrared (baseband)
1.1) Frequency Hopping Spread Spectrum
• Two data rates for transmission at 1 and 2Mbps.
• Available channel 78 with a BW of 1GHz.
• Modulation technique is GFSK.
• Each BSS select one of the three patterns of 26 hops with the 3 groups..
• Group1(0,3,6,….75),Group2(1,4,…76) and Group3(2,5,…77)
00111001
FHSS PHY
• In FHSS PHY, data transmission over media is controlled by the
FHSS PMD sublayer as directed by the FHSS PLCP sublayer.
• Binary information bits converts them into RF
signals by using carrier modulation and FHSS
techniques.
• Data whitening is used for the PSDU before transmission to
minimize DC bias on the data if long strings of 1s or 0s are
contained in the PSDU. The PHY stuffs a special symbol
every 4 octets of the PSDU in a PPDU frame
FHSS PHY PPDU

• The sync field contains a string of alternating 0s and 1s pattern


and is used by the receiver to synchronize the receiver’s
packet timing and correct for frequency offsets.
• The SFD field contains information marking the start of a PSDU
frame.

• The PLCP length word (PLW) field specifies the length of the

PSDU in octets and is used by the MAC layer to detect the end
of a PPDU frame.

• The PLCP signaling field (PSF) identifies the data rate of the
whitened PSDU ranging from 1 to 4.5 Mbps in increments of
0.5 Mbps
• The header error check field contains the results of
a calculated frame check sequence from the sending

• station.
The FHSS PMD uses two-level Gaussian frequency shift key
(GMSK) modulation to transmit the PSDU at the basic rate of
1Mbps.

• Four-level GFSK is an optimal modulation scheme enables the


whitened PSDU to be transmitted at a higher rate
1.2)DSSS PHY
•The encoding scheme that is used is DBPSK (differential binary
phase shift keying) send 1 or 2 bits per symbol.
•Total BW 2.4GHz is divided in to 11 channels with spaced by
5MHz.
•DSSS communicates non overlapping pulses at the chip rate of
11Mcps,which occupy 26 MHz.
DSSS Transmitter & Receiver
• An 11-bit Barker code (1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1) is used for
spreading
• In the transmitter, the 11-bit Barker code is applied to a modulo-2
adder together with each of the information bits in the PPDU.
• The output of the modulo-2 adder results in a signal with a data

rate that is 10 times higher than the information rate. The result

ifnrequency power level.


bandwidth
the at a reduced domain is a signal that is
spread over a wide
• At the receiver, the DSSS signal is convolved with the same 11-bit
Barker code and correlated
Frame Format
• The SYNC field is 128 bits (symbols) in length and contains a
string of 1s .The receiver uses this field to acquire
the incoming signal and to synchronize the
receiver’s carrier tracking and timing prior to receiving the
SFD

• The SFD field contains information to mark the start of the


PPDU frame.
• Signal Field - Specifies the data rate at which the
MPDU portion of the frame is transmitted.
• Length: Indicates the length of the MPDU field by specifying
the number of microseconds necessary to transmit the

• MPDU
CRC fields are used for error checking and correction.

• PPDU – PHY Protocol Data Units


• PSDU - PLCP Service Data Unit

• MPDU - MAC protocol data unit


1.3)Diffused IR
• The PMD of DFIR operates based on transmission of 250ns pulses.
• These pulses are generated by switching the transmitter LEDs on and off duration
of pulse.
• Peak power of pulse is 2W and wavelength is 850nm to 950nm.
• 16-PPM and 4-PPM modulation techniques at the data rate of 1and 2Mbps.
• 1o
l 6c-kPsPoMf 4 b -bits of information are coded occupy by the 16
slots of length of 16 bit sequence..
• In this 16x250ns=4000ns carries 4 bit of information that supports 1Mbps.
• 42-5P0PnMs=1040x0ns carries 2 bit of information that supports 2Mbps.
PLCP frame format for DFIR
1.5) IEEE 802.3 Carrier Sensing
• The receiver reads the peak voltage of wire of cable and compares it
against a threshold.
• The PHY sensing is through the CCA signal produced by PLCP..
• The real sensing mechanism done by two methods.(detects bits in air ,
checking RSS)
• Detection method is reliable than RSS because of interference..
• Virtual carrier sensing based on Network Allocation Vector (NAV)
supported by the RTS/CTS and PCF mechanisms.
• A length field in the MAC layer is used to specify the amount of time
that must elapse before the medium can be freed..
2) IEEE 802.11 MAC LAYER
802.11Layers
Layer 2 Functions
• Medium Access Control (MAC)
– On transmission, assemble data into a frame with address and error
detection fields.

– On reception, disassemble frame, and perform address recognition and


error detection.

– Govern access to the LAN transmission medium.

• Logical Link Control (LLC)


– Provide an interface to higher layers and perform flow
and error control
• The lower sublayer of the MAC layer is the
distributed coordination function (DCF). DCF uses a
contention algorithm
to provide access to all traffic.

• The point coordination function (PCF) is a centralized MAC


algorithm used to provide contention-free service. PCF is built
on top of DCF.
Distributed Coordination Function (DCF)
• DCF uses interframe space (IFS) & CSMA
• Steps

1. A station with a frame to transmit senses the medium. If the medium


is idle, it waits to see if the medium remains idle for a time equal to
IFS. If so, the station may transmit immediately.

2. If the medium is busy, the station defers transmission and continues


to monitor the medium until the current transmission is over.
3. Once the current transmission is over, the station delays another IFS. If
the medium remains idle for this period, then the station backs off a

random amount of time and again senses the medium. If the mediumis
still idle, the station may transmit. During the backoff time, if the medium
becomes busy, the backoff timer is halted and resumes when the medium
becomes idle

4. If the transmission is unsuccessful, which is determined by the absence of


an acknowledgement, then it is assumed that a collision has occurred
Point Coordination Function (PCF)
• PCF is an alternative access method implemented on top of the DCF. The
operation consists of polling by the centralized polling master (point
coordinator).

• The point coordinator makes use of PIFS when issuing polls.

• During the first part of this interval, the point coordinator issues polls in a
round-robin fashion to all stations configured for polling.

• When a poll is issued, the polled station may respond using SIFS. If the
point coordinator receives a response, it issues another poll using PIFS

• The point coordinator then idles for the remainder of the


superframe, allowing a contention period for asynchronous access
MAC LAYER

1)MAC SUB LAYER define the access mechanism and


packet formats
2) MAC MANAGEMENT SUBLAYER Roaming support,
power
management, security
2.1) MAC Sub Layer-Accessing Mechanism
• Contention methods CSMA/CA
• Contention-free Access
1) RTS/CTS(avoid hidden terminal-Exposed terminal problems)
2) PCF(assign a priority for packet transmission,based on polling)Time
bounded applications
2.1.1)CSMA/CA Operation-DCF

• Case1Station transmit a packet immediately, by sensing the channel is free.


• Case2if the channel is busy,then NAV is turned ON,By setting backoff time and
wait the DIFS period..
• SIFSShort Interframe Spacinghighest priority packet such as ACK,CTS.
• PIFSPCF-IFS2nd priority,duration between SIFS-DIFS..
• DIFSDCF-IFSLowest priority and longest duration.
• After completion of transmission each station has to wait based on its priority..
• This method reduces collision but can’t eliminate it.
Implementation of CSMA-CA/ACK
• When AP receive a packet of data, it
waits for SIFS and send ACK..
• Because SIFS<DIFS.
• All other terminals must wait until
the tx of ACK to MS is
completed.
2.1.2)Implementation of RTS/CTS Mechanism
• If a channel freesend
RTS(20bytes),which carry
source,destination address and data.
• Destination station reply CTS(16
byte),after SIFS period.
• The source terminal send data after SIFS
period.
• Finally destination reply ACK after
receiving data.
• STATION3 It hear RTS/CTS
communication for the entire period,by
setting their NAV signal ON.
• After completion of transmission,NAV is
terminated,opening the contention for
other users.

STATION 3
2.1.3) PCF Operation

• AP organizes periodical contention free period for the time bounded information.
• Data to be transmitted at the beginning of each CFP, during that period it arrange
NAV for other terminals.
• Length of the PCF is occupied by CFP + DCF packets.
• If DCF packet occupies the channel,and doesnot complete before the start of the
next CFP.
MAC frame Format
• Frame Control: Indicates the type of frame and provides control
information
• Duration/Connection ID: indicates the time (in microseconds) the
channel will be allocated for successful transmission of a MAC
frame. In some control frames, this field contains an association,
or connection identifier.

• Sequence Control: Contains a 4-bit fragment number


subfield usedfor fragmentation and reassembly, and a 12-bit
sequence-No
used to number frames sent between a given transmitter
and receiver.
• Frame Check Sequence: A 32-bit cyclic redundancy check.
Frame Control Field

Sleep mode

Encryption
Power-save mode
• Protocol version00 ,reserved for fututre.
• Type: Identifies the frame as control, management, or data.

• Subtype: Further identifies the function of frame.

•To DS: The MAC coordination sets this bit to 1 in a frame destined to the
distribution system.

•From DS: The MAC coordination sets this bit to 1 in a frame leaving the

distribution system.

• More Fragments: Set to 1 if more fragments follow this one.

• Retry: Set to 1 if this is a retransmission of a previous frame.


2.2)MAC Management Sub layer
• Establish a connection between stations and AP.
• It provide a accessing mechanism for mobile station

Functions
1. Registration
2. Handoff
3. Power management
4. Security
1)Registration
• AP periodically send Beacon frame to MS for
timing synchronization.
• It contains BSS-ID, RSS, Roaming,
time stamp.
• Beacon used to identify the AP and
N/W.
• Association REQMS send this request to
AP.
• Association RESAP grant permission
MS.
2)Handoff
Mobility Environment
• No Transition MS is static or moving but inside BSA.
• BSS Transition MS moves from one BSS to another BSS but in same ESS.
•ESS Transition  MS moves from one BSS to another BSS but in new ESS.
Connection Registration
• Rsseo-cAiation service  MS moves from one BSS to another BSS but in
same ESS.Hence MS send request to distributed system via AP.
• Diassociation service used to terminate the association, for MS when it leave
from BSS.
Handoff Procedure
MS moves from AccessPoint1 to AccessPoint1

• Step1)Send Becon signal from APMS


• Step2)MS lock AP1 who has strong RSS.
• STEP 3)MS lies in border between two AP, hence it send probe signal to all
AP’s
• Step4) All AP reply Probe via RSS to MS.
• Step5)MS select AP by a strongest signal
• Step6)MS send reassociation req to AP3
• Step7)AP reply reassociation response to MS
• Step8) Handoff message infromed to old AP1,AP2 via Inter Access Point
Protocol
Role of IAPP in Handoff
3)Power Management
• When a station is idledominates
LAN adaptor power consumption.
• It is important to put MS in
sleeping mode , buffer the data in
AP,send to MS is awakened.

• MS uses the power management


bit in the frame control field to
announce its active/sleep mode.
• With every beacon TIM sent list of
stations has buffered data.
• MS check the TIM and change its
mode to active.
• Now AP send the data to MS.
4)Security
1)Open system authentication/secret keyRequested
user send ID to open system, then the response station send the result of
request.

2) Shared key authentication


• Request Station send authentication ID using 40-bit secret code that is shared
between itself-AP.
• The second station sends a challenge text 128bytes.
• The first station sends the encrypted challenged text as a response.
• The second station send the authentication results.
IEEE 802.11a
• The PHY layer of IEEE 802.11a is based on OFDM
transmission which operates 5GHz.
• MAC layer same as like as IEEE 802.11.
• Supporting data rate Min 6Mbps -Max 54Mbps.
• Use 52 sub carriers for BPSK,QPSK,16QAM modulation
methods.
• Use convolution encoder (1/2,2/3,3/4) for error correction.
• OseFdDtoMreduce the symbol rate by distributing bits
over numerous subcarriers.
IEEE 802.11a – PHY Layer frame
format
4 1 12 1 6 16 variable 6 variable bits
rate reserved length parity tail service payload tail pad

PLCP header

PLCP preamble signal data


12 1 variable symbols

6 Mbit/s 6, 9, 12, 18, 24, 36, 48, 54 Mbit/s


• PLCP preambleconsists of 12 symbols and is used for
frequency acquisition, channel estimation, and synchronization.
The duration of the preamble is 16 μs.
• signal contains the following fields and is BPSK-modulated.
rate determines the data rate
length indicates the number of bytes in the payload field.
tail bits are set to zero, also used to reset the encoder
• diealdtaisf sent with the rate determined in the rate field .
• sieelrdvwicheicfh is used to synchronize the descrambler
of the receiver
• payload contains the MAC PDU (1-4095 byte).
• pad ensures that the number of bits in the PDU maps
to an integer number of OFDM symbols.
IEEE 802.11b
• tDeata ra min 1Mbps- max 6 Mbps
• Transmission range300m outdoor, 30m indoor
• Frequency 2.4 GHz ISM-band
• SecurityLimited, WEP insecure, SSID
• At 2.4 GHzIEEE 802.11b specify a new PHY layer called Clear
Channel Assignment (CCK) to support data rate of max
11Mbps.
• It uses Walsh code with the complementary codes for M-
ary orthogonal data tx.
Implementation of CCA Transmitter

•Serial data is multiplied by into 8-bit address.


•6 of 8 bits are used to select one of 64 orthogonal
codes.
•2it-sbare directly modulated and txed.
Implementation of CCK Receiver

•The receiver comprised two parts Barker and correlator code


• By checking the PLCP data rate,the receiver knows which
decoder employed for the rx packets.
IEEE 802.11b – PHY frame formats
Long PLCP PPDU format
128 16 8 8 16 16 bits
synchronization SFD signal variable
servic e length HEC payload

PLCP preamble PLCP header

192 µs at 1 Mbit/s DBPSK 1, 2, 5.5 or 11 Mbit/s

Short PLCP PPDU format (optional)


56 8 16 16 variable bits
16
short synch. SFD signal servic e length HEC payload
8

PLCP preamble PLCP header


(1 Mbit/s, DBPSK) (2 Mbit/s, DQPSK)

96 µs 2, 5.5 or 11 Mbit/s
PLCP Pt•enmble. The PLCP consists of a 144-bit pi'eamble that is used foi' synchroÂzation
to
deknnÔe iaÂo gaZ and to establish CCA. This is PHY dependæt, and Zcludes:
• Syzich: A 128-bit séquence of dtematÔg zei'os and ones, which is used by the PHY cñcliihy to
select Àe sppropriste antenna (ä diversity is used). and Ö reach steady-stak freqtiency offset
coit'ection and synchrœizaÂon ai& &s received pa&et timing.
• SFD: A Stait Frame del%ter which consists of ùe 16-bit binaiy patem 1111001110100000.
wliich is used to define fiame timing and nisA Àe stut of eveiy fiaæe and is cdled the SFD
(Stan Frame Delimitæ)..
PLCP Header. Ybe header consist of 48 bits. it is alu'ays hansmitted at l Mbps and contsins logical
infoitætiœ llsed by Öe PHY Layer b decode Ae ôame. It consists of:
• Signal: 8 bits which con&Ôs only ùe iate iefomaÂon. æcoded Ô 0.5 Mbps Ôcrements fiem l
Mbit, s to 4.5 Mbil s:
s Service: 8 bits reserved;
• Length: 16 bits and represents Ae numbei' of b@s con&Ôed Ô Ös packet (ux£ll fn ùs
PHY to coiaecûy detsct Ös æd of packet):
• &eader Eriær Ch»ik Field: 16 Bit CRC of As 48 bit header'.

The PLCP Ööeducss 24 bytes of overhead Öto each uüelsss Ethernet. Because the 192-bit headei-
payload is öansinitted at l Mbps, 802.llb reduces the efficiency on Öe PHY bya by 15%.
HIPERLAN
• HIPERLAN -High Performance Radio Local Area Network

• It is a European alternative for the IEEE 802.11 standards.

• It is defined by the European Telecommunications Standards

Institute (ETSI)

• The goal of the HiperLAN was to have data rate higher than

802.11

• HiperLAN/1 was planned in 1991 and implemented in


1997
HIPERLAN Family
1. HiperLAN/123Mbps
2. HiperLAN/254Mbps
3. HiperLAN/3-
HIPERACCESS
– provides up
to 100 Mbps in the
40.5–43.5 GHz
band
4. HiperLAN/4-
HIPERMAN
Hiperlan/1
features
• Data rate 23.529Mbps.
• Coverage 100m,frequency 5.2GHZ.

• Supports asynchronous and synchronoustraffic

•Suowpeprort p saving
HIPERLAN-1 Architecture Ad-hoc model
• Each HIPERLAN node is either forwarder (F) or non-forwarder.
• Forwarder Node receive packet and retransmit it to the other node.
• Non-forwarder Node Simply it accept a packet intended for it.
• Each non forwarder node select at least one forwarder node as a neighbor.
• Both nodes periodically update the routing database.

From Architecture
• Node 1,4,6 are forwarder node, having peer-peer connections
• Node 4 act as a bridge between HIPERLAN A-HIPERLAN B
PHY-MAC Layer
1)PHY Layer
• Bandwidth 5.15-5.35GHZ.Total channel is 5 with 40MHZ spacing
• Transmission power 1W
• GMSK modulation methods, support data rate 23Mbps.
• CSMA/CA used for channel access.

2) MAC Layer
• Handles encryption and power conservation.
• MAC address size is 48 bits.(source, destination and neighbor hop)
Channel Access Methods
• If a terminal senses the medium to be free at least 1700bit durations, it
immediately transmit.
• If the channel is busy the terminal access has three phases .
• Prioritization phaseit has the highest priority. If a MS has a highest priority
survive for the next phase and others are eliminated from the contention.
• Contention phaseit consists of elimination period and yield period.
• elimination period Each terminal run a random number generator to select one
of the available 12 slots in which it sends continuous burst of 256bits.
• After sending burst MS listen the channel, if it doesn’t hear any other burst, then
send another burst after 12 slots for survival..
• If a node hear any burst during this period,then eliminate itself.
• yield periodIf an MS senses the medium free for the entire yield period,then
start the tx immediately..
HiperLAN--2
• HiperLAN/2 functional specification was accomplished
Feb
2000.
• HiperLAN/2 uses the 5.15–5.25 GHz band and up to 54 Mbps
data rate.

• Provide high data rate and supports mobility


• The physical layer of HiperLAN/2 is very similar IEEE
to 802.11a wireless local area networks.
ARCHITECTURE
⚫ Connection between the MS
and AP is similar to WLAN.
⚫ But communication between
APs are different. Access point controller
⚫ It allows handover in a subnet
and IP based handover for
non homogeneous network.
⚫ It support seamless
interoperation Ethernet and
point-point connection.

Access point
Protocol stack of HIPERLAN/2
1) Physical layerOFDM ,52 Sub carriers(48 for data+4 sync)

– to provide several modulation and coding schemes

according to current radio link quality and meet the


requirements for different physical layer modes as defined
by transport channels within DLC.

2)DLC layer

– The DLC layer constitutes the logical link between an

access point (AP) and mobile terminals (MTs)


The DLC layer consists of

• Medium Access Control (MAC),

• Error control (EC),


• Radio link control (RLC),

• DLC connection control (DCC),

• Radio resource control (RRC) and


• Association control function (ACF)
2.2)MAC-Layer

• Medium access in HIPERLAN/2 is based on the TDD/TDMA


• It uses a MAC frame of 2 ms duration.
• An AP provides centralized control and informs the mobile
terminals at which point in time in the MAC frame they are
allowed to transmit their data.

• Time slots are allocated dynamically depending on the need


for transmission resources.

• HIPERLAN/2 operates as a connection-oriented wireless link


MAC FRAME

• Down Link Data,

• Uplink Data, and


• Broadcast control (BCH),
• Frame Control (FCH), • Random Access (RCH)
• Access control (ACH),
• The BCH contains broadcast control information for all
the MTs. It provides for general information such as the
network and AP identifiers, transmission power levels,
and FCH and RCH length and wake-up indicator.
• The FCH contains details of distribution of resources
among the fields of each packet.
• The ACH conveys information on previous access
attempts made in the RCH
• The RCH is commonly shared among all MTs
for random access and contention. If collisions
occur the results from RCH access are re-
ported back to the MTs in ACH
3)Convergence layer
– it maps the service requirements of the higher layer to the
service offered by the data link control layer
– converts packets to frame and frame to packets
Relation between logic-transport channels
SBCHIt carry the information about handover,security,association and
radio link control functions.

DCCHConveys RLC sublayer signals between MS-AP.

UDCHCarry DLC PDU for convergence layer data

ASCHcarry Assoiation req and Association reply messages


Security
• Comprehensive security mechanisms are seen in the
HIPERLAN- system compared with other wireless
2 standards.
• When contacted by an MT, the AP will respond initiating a
selected authentication and encryption procedure.
• As always, there is an option not to use any authentication
or encryption.
• Diffie-Hellman encryption is used for
authentication
WIRELES
S ATM
ATM Forum Wireless ATM Working Group
 compatibility to existing ATM Forum standards important and easily
upgrade existing ATM networks with mobility functions.
characteristics
• Location management able to locate a wireless terminal or a
mobile user.
• Mobile routingto route the traffic through the network to the
access point currently responsible for the wireless terminal. Each
time a user moves to a new access point, the system must reroute
traffic.
• Handover signalingThe network must provide mechanisms to set
up new connections between intermediate systems.
• QoS and traffic controlWATM should be able to offer many QoS
parameters.
• Network management to control the network To ensure wireless
access
WATM-Architecture
EMAS-N

WMT
RAS

EMAS-E

M-NNI

WMT RAS
EMAS-N

LS
AUS
Wireless ATM Protocol Architecture
Radio Access LayerTo support wireless communication,new
wireless channel specific medium access.

Medium Access Controlprovide point to point link for the


higher protocol.

Data link controlprovide service to ATM layer.used to control


reduce channel error detection/correction

Radio resource controlneeded for support of control plane


functions related to the radio access layer
WATM components
• T(Terminal)-A standard ATM terminal offering ATM services defined
for fixed ATM networks
• MT(Mobile Terminal)-MT can be moved between different
access points within a certain domain
• WT(wireless Terminal)-This terminal is accessed through a wireless
link
• WireMleTss (W Mobile ATM Terminal)-Combination of a
wireless and a mobile terminal results in the WMT
• RadAiSo (R Access System)-Point of access to a network
through a radio link
• EndAS-E ( -user Mobility-supporting ATM Switch -
Edge)- Switches with the support of end user mobility
• EnMd AS-N (E -user Mobility-supporting ATM Switch -
Network)-A whole network can be mobile not just terminals
• MS(Mobile ATM Switch)-ATM switches can also be mobile and
can use wireless access to another part of ATM network
• ACT(Adhoc controller terminal)-These terminal control wireless
access without aan RAS
• M-NNI (Network-to-Network Interface with Mobility support)
• Loc(ation Server)
• AutShe( ntication Server)

You might also like